Cybersecurity4 hrs ago

Texas AG Declares Conduent Ransomware Breach Largest U.S. Data Breach Ever

Overview of the Conduent ransomware breach impacting 25 million Americans, timeline, exposed data, AG declaration, and recommended mitigations for organizations.

Peter Olaleru/3 min/US

Cybersecurity Editor

TweetLinkedIn
LIVE from Blue Bell: No. 7 Texas A&M vs. No. 8 Auburn (Saturday, Game 1)

LIVE from Blue Bell: No. 7 Texas A&M vs. No. 8 Auburn (Saturday, Game 1)

Source: TexagsOriginal source

TL;DR: In February 2026 Texas Attorney General Ken Paxton declared the Conduent ransomware incident the largest data breach in U.S. history, affecting over 25 million individuals. Attackers accessed names, Social Security numbers, birth dates, addresses, medical diagnosis codes and insurance claim numbers between October 2024 and January 2025.

Context

Conduent Business Services processes benefits and human‑resources data for state Medicaid programs, employer health plans and federal agencies. Most of the 25 million‑plus recipients had never interacted with the company before receiving breach notification letters in early 2026. The letters offered a year of free credit monitoring and an apology.

Key Facts

- The intrusion began in October 2024 and continued through January 2025, during which ransomware operators exfiltrated personal and medical records. - Exposed data included full names, Social Security numbers, dates of birth, home addresses, diagnosis codes and health insurance claim numbers. - Texas Attorney General Ken Paxton announced in February 2026 that the breach surpasses all prior U.S. incidents in scale, labeling it the largest ever recorded. - Technical details of the initial intrusion have not been publicly disclosed; Conduent has not attributed the attack to a specific threat actor or named a exploited vulnerability. - No ransom payment has been confirmed, and the attackers have not released the stolen data on public leak sites as of the latest disclosures.

What It Means

The scale of the breach places unprecedented pressure on affected individuals to monitor for identity theft and fraud. For organizations, it highlights the risk posed by third‑party processors that aggregate sensitive health and benefits data. Regulators may increase scrutiny of vendor management practices and breach notification timelines.

Mitigations

- Apply the latest security patches to internet‑facing services, prioritizing CVE‑2023‑28252 (Citrix ADC/Gateway) and CVE‑2022‑22965 (Spring4Shell) as examples of commonly exploited vectors in ransomware campaigns. - Enforce multifactor authentication on all privileged accounts and remote access solutions. - Segment networks to isolate systems that store personal health information from general corporate traffic. - Deploy endpoint detection and response (EDR) tools tuned to detect MITRE ATT&CK techniques T1059 (Command‑and‑Control Scripting), T1078 (Valid Accounts), and T1041 (Exfiltration Over Command‑and‑Control Channel). - Conduct regular tabletop exercises that include third‑party breach scenarios and verify that incident response playbooks cover timely notification to state attorneys general. - Review and tighten vendor contracts to require continuous security monitoring, immediate breach reporting, and annual third‑party audits.

What to watch next: Federal agencies may issue guidance on breach reporting thresholds, and state legislatures could consider stricter penalties for inadequate vendor oversight.

TweetLinkedIn

More in this thread

Reader notes

Loading comments...