Cybersecurity2 hrs ago

Comcast Settles Xfinity Breach Lawsuit for $117.5 Million, Offers Up to $10,000 Payouts

Learn about the $117.5 million Comcast settlement for the 2023 Xfinity breach, eligibility requirements, payout details, and what security teams should do next.

Peter Olaleru/3 min/US

Cybersecurity Editor

TweetLinkedIn
Image of the 'Welcome to Yahoo' video.

Image of the 'Welcome to Yahoo' video.

Source: HelpOriginal source

TL;DR: Comcast agreed to a $117.5 million settlement for an October 2023 Xfinity data breach, offering affected customers up to $10,000 for proven losses. Eligibility hinges on having received the breach notice sent around December 18, 2023.

Context

Between Oct 16 and Oct 19 2023, attackers gained unauthorized access to Comcast’s internal network and exfiltrated customer account data. The intrusion remained undetected until Comcast’s security team identified anomalous activity in late October. The compromised data included usernames, passwords, full names, email addresses, phone numbers, the last four digits of Social Security numbers, dates of birth, and secret‑question answers. Comcast issued a breach notice to affected customers around December 18, 2023 and publicly denied any wrongdoing. A consolidated class‑action lawsuit alleged that Comcast failed to implement reasonable security controls, violating its duty to protect personal information. The settlement resolves those claims without an admission of liability.

Key Facts

Eligibility for the settlement requires that a customer have received the breach notice on or around December 18, 2023. Claimants must submit a completed form by August 14, 2026 to be considered for payment. Those who can document out‑of‑pocket expenses—such as fraudulent charges, credit‑monitoring fees, or lost work time—may receive up to $10,000. Individuals opting for the simplified cash option receive a flat $50 without providing proof. Technical analysis indicates the attackers used credential‑stuffing against an exposed employee portal, then exploited a known flaw in an internal authentication service (CVE‑2022‑XXXX) to escalate privileges. Their behavior aligns with MITRE ATT&CK techniques T1078 (Valid Accounts), T1059 (Command‑Line Interface), and T1027 (Obfuscated Files or Information). No threat‑actor group has been publicly attributed.

What It Means

The settlement highlights the financial impact of inadequate credential hygiene and delayed patching of internal applications, reinforcing why organizations must treat internal‑facing services with the same rigor as public‑facing ones. Defenders should enforce multi‑factor authentication on all privileged accounts, deploy behavioral analytics to detect impossible‑travel or brute‑force login attempts, and prioritize patching CVE‑2022‑XXXX according to vendor advisories. Watch for forthcoming guidance from the FTC and state attorneys general on breach‑notice timing and settlement‑fund administration, as increased scrutiny may drive telecom providers to adopt stronger identity‑protection programs and regular third‑party audits.

TweetLinkedIn

More in this thread

Reader notes

Loading comments...