Conduent Data Breach: 10 Million+ Individuals' Personal & Medical Data Exposed

Government Services Contractor Conduent Confirms Data Breach Affecting Over 10 Million People

HIGH
October 30, 2025
October 31, 2025
4m read
Data BreachThreat IntelligenceRegulatory

Impact Scope

People Affected

more than 10 million

Industries Affected

GovernmentHealthcare

Geographic Impact

United States (national)

Related Entities(initial)

Organizations

U.S. federal law enforcement

Other

Conduent Business Services, LLCEdelson Lechtzin LLP

Full Report(when first published)

Executive Summary

Conduent Business Services, LLC, a significant provider of business process services to government agencies, has confirmed a major data breach that exposed the sensitive personal and medical information of more than 10 million people. The company discovered the incident on January 13, 2025, after identifying unauthorized access to its network that occurred over a nearly three-month period. The exfiltrated data includes highly sensitive information such as Social Security numbers and health data, placing millions of individuals at high risk of identity theft and fraud. The breach is now under investigation by federal law enforcement and has prompted legal action from consumer rights law firms.

Threat Overview

The breach occurred between October 21, 2024, and January 13, 2025, during which an unauthorized third party maintained access to Conduent's systems. The threat actor successfully exfiltrated a large volume of files containing Personally Identifiable Information (PII) and Protected Health Information (PHI). The attack vector has not been publicly disclosed, but the prolonged access suggests a failure in detection and response controls. The victims are individuals whose data was processed by Conduent on behalf of its various government clients across the United States. Notifications have been filed in multiple states, including Oregon, Massachusetts, California, Texas, Washington, and New Hampshire, indicating the widespread nature of the breach.

Technical Analysis

While specific TTPs were not released by Conduent, the nature of the attack—prolonged network access followed by large-scale data exfiltration—is characteristic of many financially motivated cybercrime groups or ransomware operations conducting double extortion.

Potential attack chain based on similar incidents:

  1. Initial Access: Likely achieved through exploiting a public-facing application (T1190 - Exploit Public-Facing Application), a phishing campaign (T1566 - Phishing), or the use of stolen credentials (T1078 - Valid Accounts).
  2. Persistence & Privilege Escalation: After gaining a foothold, the actor would establish persistence and escalate privileges to gain broader access to the network.
  3. Discovery: The actor would have spent significant time mapping the network and identifying high-value data repositories, as evidenced by the three-month dwell time.
  4. Data Collection & Exfiltration: The threat actor located and staged sensitive files before exfiltrating them to an external location (T1567.002 - Exfiltration to Cloud Storage). The complexity of the stolen files noted by Conduent suggests the data was taken from multiple, disparate systems.

Impact Assessment

The impact of this breach is severe. The exposure of over 10 million individuals' Social Security numbers, medical data, and health insurance information creates a significant, long-term risk of identity theft, financial fraud, and sophisticated phishing attacks. For Conduent, the financial impact will be substantial, including costs for forensic investigation, credit monitoring services for victims, regulatory fines (potentially under HIPAA and state laws), and legal fees from class-action lawsuits. The reputational damage is also immense, potentially jeopardizing its lucrative contracts with government agencies who are under pressure to ensure the security of their supply chain.

Cyber Observables for Detection

Organizations can hunt for similar types of breaches by monitoring for the following activities:

Type Value Description
Network Traffic Pattern Anomalous data egress Monitor for unusually large data transfers from internal servers to external IP addresses, especially those not associated with normal business operations.
Log Source File Auditing Logs Enable and monitor for mass file access or data staging activities, where a large number of sensitive files are copied to a single location before exfiltration.
Command Line Pattern Data compression commands Look for the execution of 7z.exe, rar.exe, or similar archiving tools on servers that do not typically use them.
Process Name rclone.exe, megasync.exe Monitor for the presence or execution of legitimate data transfer tools often abused by threat actors for exfiltration.

Detection & Response

  • Detection: Implement a Security Information and Event Management (SIEM) system to correlate logs from various sources. Use User and Entity Behavior Analytics (UEBA) to detect anomalous account behavior, such as logins from unusual locations or access to data outside of normal working hours. Deploy network traffic analysis tools to baseline normal data flows and alert on significant deviations indicative of exfiltration. A key D3FEND technique is D3-NTA: Network Traffic Analysis to identify suspicious outbound connections.

  • Response: Upon detecting suspicious activity, an organization's incident response plan should prioritize isolating the affected systems to prevent further data loss. Forensic data should be preserved for investigation. Communication with legal counsel, law enforcement, and regulatory bodies must be initiated promptly. Conduent's engagement of

Timeline of Events

1
October 21, 2024
Unauthorized third party gains access to Conduent's network.
2
January 13, 2025
Conduent discovers the cybersecurity event and the period of unauthorized access ends.
3
October 29, 2025
Conduent's breach is publicly reported and a legal investigation is launched.
4
October 30, 2025
This article was published

Article Updates

October 31, 2025

Severity increased

Conduent breach attributed to SafePay ransomware, impacting 10.5M individuals with 8.5TB data exfiltrated, incurring $25M in costs.

New details reveal the Conduent data breach, affecting 10.5 million individuals, is attributed to the SafePay ransomware group. Attackers exfiltrated a massive 8.5 terabytes of sensitive data, including SSNs and medical records, leading to $25 million in direct costs for Conduent. The incident, now considered the eighth-largest healthcare breach, also highlights criticism over delayed victim notifications and the company's failure to offer free identity theft protection.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

ConduentCybersecurityData BreachGovernment ContractorMedical DataPHIPIISocial Security Number

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading