Limited number of customers
Freedom Mobile, Canada's fourth-largest wireless carrier, has disclosed a data breach that exposed the personal information of a subset of its customers. The company announced on December 3, 2025, that it detected the unauthorized access on October 23, 2025. The investigation revealed that the threat actor gained entry by using a compromised account belonging to one of the company's subcontractors. The exposed data includes customer Personally Identifiable Information (PII) such as names, addresses, and dates of birth. Freedom Mobile has stated that financial information and account passwords were not compromised. The company is in the process of notifying affected customers and has implemented additional security measures to secure its platform.
This incident is a classic example of a supply chain attack, where an organization is breached through a trusted third-party vendor or partner. The attack vector was a compromised account of a subcontractor, which highlights the security risks associated with third-party access to sensitive systems.
The core of this attack lies in the exploitation of trusted relationships, a technique tracked by MITRE as T1199 - Trusted Relationship. By compromising a subcontractor, the attacker bypassed perimeter defenses and appeared as a legitimate user. Once inside, they likely used the platform's intended functionality to access and exfiltrate customer data.
The exposed data includes:
Crucially, the company asserts that passwords, PINs, and credit card information were not accessed, which significantly reduces the risk of immediate financial fraud. However, the stolen PII is more than sufficient to conduct sophisticated social engineering and phishing attacks.
While Freedom Mobile describes the number of affected customers as 'limited', the impact on those individuals could be significant. The stolen data is a valuable commodity for cybercriminals and can be used for:
For Freedom Mobile, the breach results in reputational damage, customer churn, and the costs associated with incident response, legal fees, and potential regulatory fines.
D3-UGLPA: User Geolocation Logon Pattern Analysis is a relevant technique.Mandating MFA for all third-party access is the most effective way to prevent the use of compromised credentials.
Apply the principle of least privilege to all third-party accounts, ensuring they can only access the specific data and systems required for their function.
To directly counter the attack vector used in the Freedom Mobile breach, organizations must enforce strong MFA for all external access, especially for third-party contractors and vendors. This should not be optional. If a subcontractor's credentials are stolen, MFA acts as a critical backstop, preventing the attacker from logging in. This policy should apply to VPN access, cloud dashboards, and any application that houses sensitive or customer data. For Freedom Mobile, mandating MFA for all subcontractor accounts accessing the customer management platform would likely have prevented this breach entirely.
Implement a User and Entity Behavior Analytics (UEBA) solution to monitor access patterns for all accounts, with a special focus on third-party users. The system should baseline normal behavior for each subcontractor account: what data they typically access, how much data they access, what times they log in, and from what geographic locations. The system should then generate alerts for any significant deviation from this baseline. For example, an alert could be triggered if a subcontractor account that normally views 10 customer records per day suddenly accesses 1,000, or if an account that always logs in from Canada suddenly authenticates from an IP in Eastern Europe. This allows for the detection of a compromised account even if the attacker is using valid credentials.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats