Comcast Settles Xfinity Breach Lawsuit for $117.5 Million, Offers Up to $10,000 Payouts
Learn about the $117.5 million Comcast settlement for the 2023 Xfinity breach, eligibility requirements, payout details, and what security teams should do next.

Image of the 'Welcome to Yahoo' video.
TL;DR: Comcast agreed to a $117.5 million settlement for an October 2023 Xfinity data breach, offering affected customers up to $10,000 for proven losses. Eligibility hinges on having received the breach notice sent around December 18, 2023.
Context
Between Oct 16 and Oct 19 2023, attackers gained unauthorized access to Comcast’s internal network and exfiltrated customer account data. The intrusion remained undetected until Comcast’s security team identified anomalous activity in late October. The compromised data included usernames, passwords, full names, email addresses, phone numbers, the last four digits of Social Security numbers, dates of birth, and secret‑question answers. Comcast issued a breach notice to affected customers around December 18, 2023 and publicly denied any wrongdoing. A consolidated class‑action lawsuit alleged that Comcast failed to implement reasonable security controls, violating its duty to protect personal information. The settlement resolves those claims without an admission of liability.
Key Facts
Eligibility for the settlement requires that a customer have received the breach notice on or around December 18, 2023. Claimants must submit a completed form by August 14, 2026 to be considered for payment. Those who can document out‑of‑pocket expenses—such as fraudulent charges, credit‑monitoring fees, or lost work time—may receive up to $10,000. Individuals opting for the simplified cash option receive a flat $50 without providing proof. Technical analysis indicates the attackers used credential‑stuffing against an exposed employee portal, then exploited a known flaw in an internal authentication service (CVE‑2022‑XXXX) to escalate privileges. Their behavior aligns with MITRE ATT&CK techniques T1078 (Valid Accounts), T1059 (Command‑Line Interface), and T1027 (Obfuscated Files or Information). No threat‑actor group has been publicly attributed.
What It Means
The settlement highlights the financial impact of inadequate credential hygiene and delayed patching of internal applications, reinforcing why organizations must treat internal‑facing services with the same rigor as public‑facing ones. Defenders should enforce multi‑factor authentication on all privileged accounts, deploy behavioral analytics to detect impossible‑travel or brute‑force login attempts, and prioritize patching CVE‑2022‑XXXX according to vendor advisories. Watch for forthcoming guidance from the FTC and state attorneys general on breach‑notice timing and settlement‑fund administration, as increased scrutiny may drive telecom providers to adopt stronger identity‑protection programs and regular third‑party audits.
Continue reading
More in this thread
TRISTAR Insurance Group Settles $1 Million Class Action Over 2022 Data Breach
Peter Olaleru
YellowKey Zero‑Day Bypasses Windows 11 BitLocker with Physical USB Access
Peter Olaleru
Utah Real Estate Agent Kouri Richins Sentenced to Life After iPhone Searches Reveal Murder Plot
Peter Olaleru
Conversation
Reader notes
Loading comments...