Identity Service Providers CGI Group and Aura Hit by Data Breaches

Data Breaches at Identity Service Providers CGI Group and Aura Expose Sensitive User Data

HIGH
March 20, 2026
3m read
Data BreachSupply Chain AttackThreat Actor

Impact Scope

People Affected

35,000 customers of Aura, potentially millions of Swedish citizens

Affected Companies

CGI Inc.Aura

Industries Affected

TechnologyGovernment

Geographic Impact

Sweden (global)

Related Entities

Threat Actors

ShinyHunters

Organizations

Swedish Tax Agency

Other

Full Report

Executive Summary

On March 20, 2026, two significant data breaches came to light, affecting key players in the identity and IT services industries. CGI Inc., a major IT consulting firm responsible for managing Sweden's e-government platform, has launched an investigation after its data was discovered for sale on the dark web. Separately, identity protection firm Aura confirmed it was breached by the notorious ShinyHunters hacking collective. ShinyHunters claims to have stolen 12GB of files impacting 35,000 customers, although Aura states the breach was limited to a marketing tool from a previously acquired company. These incidents underscore the attractiveness of identity data to cybercriminals and expose risks in both government service providers and the supply chain of security companies themselves.

Threat Overview

CGI Group Incident

  • Nature of Breach: Data discovered on the dark web, suggesting a network intrusion and data exfiltration.
  • Threat: An unknown threat actor has compromised CGI Group's systems and is attempting to monetize the stolen data. The full scope is under investigation.
  • Significance: As the manager of Sweden's e-government platform, a breach at CGI could potentially expose the sensitive personal data of Swedish citizens who use the platform to interact with agencies like the Swedish Tax Agency. This represents a potential nation-state level data security issue.

Aura Incident

  • Threat Actor: ShinyHunters, a well-known hacking group famous for large-scale data breaches and selling stolen data on dark web forums.
  • Nature of Breach: ShinyHunters claims to have stolen 12GB of sensitive files. Aura has clarified the breach originated from a third-party marketing tool used by a company it acquired in 2021.
  • Significance: This is a classic supply chain attack. The compromise of a less secure, third-party tool (a marketing platform) led to a data breach at a security-focused company. It highlights that a company's security is only as strong as its least secure vendor or acquisition.

Impact Assessment

  • CGI Group: The potential impact is very high. If the breach includes data from the Swedish e-government platform, it could lead to widespread identity theft, fraud, and a significant loss of public trust in digital government services. The investigation will be critical to determine the actual scope of data exposed.
  • Aura: While Aura states the breach was limited, the compromise of an identity protection firm is highly damaging to its reputation. The 35,000 affected customers must now be wary of targeted phishing attacks and potential identity fraud, even if the exposed data was 'limited.' The incident serves as a stark reminder for companies to conduct thorough security due diligence during mergers and acquisitions and to secure or decommission legacy third-party tools.

Detection & Response

For both companies, the response phase is critical.

  • CGI Group is in the initial investigation phase, likely working with forensic experts to determine the scope of the breach and identify the initial access vector.
  • Aura has moved to public communication, attempting to control the narrative by clarifying the limited scope of the breach. Their internal response would have involved isolating the compromised marketing tool and assessing the exact data exposed.

Mitigation

These incidents offer key mitigation lessons for all organizations:

  1. Third-Party Risk Management (M1017): Rigorously vet the security posture of all third-party vendors and partners. This is especially critical during M&A activities. Acquired companies' systems and vendor relationships must be brought up to the parent company's security standards. This aligns with D3-JFAPA: Job Function Access Pattern Analysis to understand third-party interactions.
  2. Data Minimization: Only collect and store data that is absolutely necessary. For the Aura breach, the fact that a marketing tool contained sensitive customer information is a concern. Sensitive PII should not reside in marketing systems.
  3. Dark Web Monitoring: Proactively monitoring the dark web for mentions of your company, domains, and executive names can provide early warning of a data breach, as seen in the CGI Group case.
  4. Network Segmentation (M1030): Segmenting networks can prevent a compromise in one area (like a marketing system) from spreading to more sensitive corporate or production environments. This is a core part of D3-NI: Network Isolation.

Timeline of Events

1
January 1, 2021
Aura acquires a company whose marketing tool would later be breached.
2
March 20, 2026
Breaches at both CGI Group and Aura are publicly reported.
3
March 20, 2026
This article was published

MITRE ATT&CK Mitigations

Continuously scan for vulnerabilities not just in primary systems, but also in third-party and subsidiary systems.

Isolate third-party and marketing systems from sensitive corporate data environments.

Mapped D3FEND Techniques:

Ensure that employees at acquired companies receive the same level of security training as parent company employees.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Data BreachShinyHuntersCGI GroupAuraThird-Party RiskSupply Chain AttackPII

📢 Share This Article

Help others stay informed about cybersecurity threats