Cybersecurity1 hr ago

Comcast Settles 2023 Data Breach for $117.5 Million, Sets August 2026 Claim Deadline

Comcast settles 2023 data breach for $117.5 million, offers up to $10,000 payouts with August 14 2026 claim deadline and three years of credit monitoring.

Peter Olaleru/3 min/US

Cybersecurity Editor

TweetLinkedIn
Comcast Settles 2023 Data Breach for $117.5 Million, Sets August 2026 Claim Deadline
Source: EconomictimesOriginal source

Comcast has agreed to a $117.5 million settlement for a 2023 data breach, offering affected customers up to $10,000 in compensation if they file a claim by August 14, 2026.

Context Between October 16 and October 19 2023, attackers infiltrated Comcast’s network and accessed usernames, passwords, contact information, dates of birth, partial Social Security numbers, and secret questions and answers used for account recovery. The breach was identified through anomalous traffic detected by Comcast’s security operations center. The intrusion was traced to a vulnerability in networking equipment supplied by Citrix Systems and Cloud Software Group, which allowed unauthorized remote access.

Key Facts Under the settlement, Comcast will pay $117.5 million to resolve consolidated lawsuits. Eligible consumers may choose a flat payment of about $50 or submit documentation for reimbursement of proven losses, with a maximum of $10,000. All claimants receive three years of free credit monitoring and identity‑theft protection. Judge John Milton Younge described the agreement as fair, reasonable, and adequate during preliminary approval. The final approval hearing is set for July 7, and payments will follow once the court authorizes the deal. Consumers must submit their claim form by August 14, 2026 to remain eligible.

What It Means The settlement provides a direct financial remedy for victims who can demonstrate fraudulent charges, tax‑filing abuse, or other out‑of‑pocket costs tied to the exposed data. For many, the three‑year credit‑monitoring service may outweigh the cash amount, given that stolen credentials often surface in underground markets months or years later. The case highlights how reliance on third‑party networking gear can create a single point of failure, prompting organizations to scrutinize supply‑chain security. Average payouts are expected to be well below the $10,000 maximum, with most recipients receiving the baseline $50 amount.

Mitigations Security teams should apply the latest Citrix ADC and Gateway security patches immediately, as the exploited flaw is typically remediated in recent updates. Enforce multi‑factor authentication on all remote‑access portals and review logs for anomalous login attempts using MITRE ATT&CK technique T1078 (Valid Accounts). Deploy network‑segmentation to limit lateral movement and enable detection of suspicious internal traffic with signatures for CVE‑2023‑XXXX (if disclosed) or generic exploitation patterns. Maintain an up‑to‑date asset inventory of third‑party software and subscribe to vendor security advisories. Consider deploying endpoint detection and response (EDR) tools to flag credential‑dumping or lateral‑movement behaviors.

What to watch next Monitor the July 7 final approval hearing for any objections that could alter the payout structure. Watch for post‑settlement fraud trends as the three‑year monitoring period begins.

TweetLinkedIn

More in this thread

Reader notes

Loading comments...