Conduent Data Breach Expands to 25 Million Americans in Largest Healthcare-Adjacent Incident
Government technology contractor Conduent's January 2025 ransomware attack has ballooned to affect over 25 million Americans — with Texas alone at 15.4 million, nearly four times the initially disclosed figure — exposing SSNs and medical data.
The data breach at government technology contractor Conduent Business Services has expanded to affect over 25 million Americans, making it potentially the largest healthcare-adjacent breach in US history. The breach originated with a ransomware attack in January 2025 that disrupted Conduent's operations for several days, but the scope of exposed data has grown dramatically throughout 2025 and 2026 as state attorneys general and federal investigators have forced fuller disclosures.
The Expanding Scope
Texas alone accounts for 15.4 million affected individuals — roughly half the state's population. This figure is nearly four times the 4 million that Conduent initially told Texas authorities were affected, a discrepancy that has drawn scrutiny from the state's attorney general. Oregon has confirmed an additional 10.5 million affected residents. The combined total of over 25 million continues to grow as additional states complete their own assessments of the data Conduent processed on their behalf.
The data compromised includes names, Social Security numbers, medical data, and health insurance information — the most sensitive categories of personal information, with direct implications for identity theft, insurance fraud, and medical identity fraud.
Government Contractor Risk
Conduent processes government benefits, healthcare claims, and other sensitive transactions on behalf of state and federal agencies. The company's role as a government technology contractor means that a single breach exposes data from multiple government programs across multiple states — creating a blast radius that individual state agencies cannot fully assess on their own because they do not have visibility into what other states' data was also compromised in the same incident.
Texas Attorney General Ken Paxton issued Civil Investigative Demands to both Conduent and Blue Cross Blue Shield of Texas, seeking detailed information about the breach's scope and the adequacy of the security measures that were in place at the time of the attack. At least 10 federal class-action lawsuits have been filed in the US District Court for the District of New Jersey, where Conduent is headquartered.
Disclosure Accountability
The gap between Conduent's initial disclosure — 4 million affected in Texas — and the revised figure of 15.4 million raises questions about breach disclosure practices. Whether the initial undercount reflected incomplete forensic analysis, deliberate minimization, or a genuinely evolving understanding of the breach's scope, the practical effect is the same: millions of Americans whose data was compromised did not receive timely notification and could not take protective measures during the period between the initial and revised disclosures.
For organizations that contract with government technology vendors, the Conduent incident illustrates the concentration risk that arises when a single contractor handles sensitive data for multiple government clients. A breach at the contractor level cascades across all of its government customers simultaneously, and the government agencies themselves may have limited visibility into or control over the contractor's security posture.
Related Articles
Cloudflare 2026 Threat Report: 230 Billion Daily Blocked Threats and the Rise of Credential Attacks
Cloudflare has published its inaugural annual threat report revealing the company blocks over 230 billion threats daily across 20% of global web traffic. DDoS attacks doubled year-over-year to 47.1 million incidents, with the largest reaching a record 31.4 Tbps, while bots now account for 94% of all login attempts.
HashiCorp Patches Consul Arbitrary File Read Vulnerability in Kubernetes Auth
HashiCorp has released emergency patches for Consul to address CVE-2026-2808, a medium-severity vulnerability allowing arbitrary file reads when Kubernetes authentication is enabled. The fix also adds HTTP server timeouts to prevent Slowloris denial-of-service attacks against Consul agent endpoints.
Let's Encrypt Now Issues Six-Day Certificates and IP Address Certificates via Certbot
Let's Encrypt and the EFF have announced support for six-day (160-hour) certificates and IP address certificates through Certbot 5.3 and 5.4. The ultra-short-lived certificates reduce the impact window of compromised keys by design, while IP address certificates enable HTTPS for services identified by address rather than hostname.