TL;DR
- Conduent, a government and healthcare services vendor, had a breach affecting 25M+ people — up from early estimates of 10M
- Attackers spent 3 months inside Conduent's network (Oct 2024–Jan 2025) and exfiltrated 8TB of data
- Your business faces the same risk: vendors you rely on can be compromised for months without detection
- The warning sign? Unusual vendor activity, delayed breach notifications, or vague incident details
The Conduent Breach: What We Know Now
Conduent Business Services, a back-office support vendor serving 100M+ people across 30+ US states, discovered a hack on January 13, 2025, but the breach began months earlier [1]. Attackers had access from October 21, 2024 to January 13, 2025 — 84 days of stealthy access before detection [2].
Free Resource
Get Our Weekly Cybersecurity Digest
Every Thursday: the threats that matter, what they mean for your business, and exactly what to do. Trusted by SMB owners across Australia.
No spam. No tracking. Unsubscribe anytime. Privacy
Get the Free Cybersecurity Checklist
A practical, no-jargon security checklist for Australian businesses. Download free — no spam, unsubscribe anytime.
Send Me the Checklist →The victim count has exploded from early estimates of 10.5M to 25M+ nationwide, including:
- 15.4M Texas residents (up from 4M in early estimates) [3]
- 10.5M Oregon residents [4]
- 17,000 Volvo Group employees [5]
- Blue Cross Blue Shield members in Texas, Montana, and other states [2]
- Medicaid, SNAP, and other state benefit recipients across 30+ states [4]
The ransomware gang SafePay claimed responsibility, threatening to publish 8.5 terabytes of stolen data [2].
What Was Stolen? Forever Data
Conduent processes benefits, HR data, and payments for government agencies and corporations. The stolen data includes [1][2]:
- Full legal names, addresses, dates of birth
- Social Security numbers (the forever identifier that can't be changed)
- Health insurance details and medical information
- Claims data and benefit enrollment records
- Government identifiers (state IDs, taxpayer numbers)
This isn't just contact info. This is the data needed to:
- Open fraudulent credit lines
- File fake tax returns
- Commit medical identity theft
- Apply for government benefits in your name
- Execute highly targeted spear-phishing
According to the Identity Theft Resource Center, breaches involving SSNs and medical data increase victim risk by 340% compared to email-only breaches [6].
The Real Story: Dwell Time
The most alarming detail isn't the 25M victims. It's the 3-month dwell time — 84 days attackers spent inside Conduent's network, exploring, exfiltrating 8TB, and planning extortion.
According to CrowdStrike's 2025 Global Threat Report, the average global dwell time is 212 days (7 months) [7]. But for government and healthcare vendors, the stakes are higher:
- More data = longer exfiltration time
- Legacy systems = easier to hide in
- Compliance requirements = slower to patch/upgrade
Why dwell time matters:
- More data stolen = more victims, more regulatory fines
- Attackers learn your network = repeat access possible
- Backdoors installed = persistent access even after "remediation"
- Data exfiltrated over months = harder to detect what's gone
IBM's 2025 Cost of a Data Breach Report found breaches with dwell times over 200 days cost 40% more to remediate than breaches detected in under 30 days [8].
The Vendor Blind Spot: Why This Keeps Happening
Conduent sits behind the scenes of US public services. Most victims never heard of Conduent until a breach notification arrived [4]. This is the vendor blind spot:
1. You don't control your vendors' security Your data flows through vendor systems you can't see, audit, or secure. If Conduent's monitoring missed attackers for 3 months, your data was exposed for 3 months — and you had no way to know.
2. Breach notification delays Conduent discovered the breach January 13, 2025, but didn't publicly disclose until April 2025 (SEC filing) [2]. State notifications trickled out through late 2025 and into 2026 as investigations uncovered more affected clients. For your business, this means:
- You may not know you're affected for months
- Your incident response starts months late
- Evidence (logs, attacker artifacts) may be deleted or degraded
3. Cascading impact Conduent's breach affected:
- State governments (Texas, Oregon, Montana, others)
- Health insurers (Blue Cross Blue Shield, Humana, Premera)
- Corporations (Volvo, others not yet disclosed)
- Individuals (25M+ and counting) [2][3][5]
Your vendors have vendors. One breach cascades through entire ecosystems.
ISO 27001 SMB Starter Pack — $97
Everything you need to start your ISO 27001 journey: gap assessment templates, policy frameworks, and implementation roadmap built for Australian SMBs.
Get the Starter Pack →The Warning Signs Your Business Must Watch For
You can't prevent vendor breaches, but you CAN detect them faster. Here are the red flags:
1. Vague breach notifications If a vendor sends a generic "we experienced a security incident" letter without specifics:
- What data types were involved?
- What was the date range of unauthorized access?
- Was data exfiltrated? Encrypted? Both?
- What security measures are they implementing post-breach?
Vague language often means they don't fully understand the breach yet — or won't admit the scope.
2. Delayed notifications If a vendor notifies you months after the incident (as Conduent did):
- Ask for the timeline of discovery and disclosure
- Ask why there was a delay
- Request access to investigation summaries (if you're a large client)
- Check if breach notification deadlines were met (varies by state)
According to the National Conference of State Legislatures, 49 states have breach notification laws with timelines ranging from 30 to 90 days [9]. Delays beyond that warrant scrutiny.
3. Unusual vendor activity Watch for anomalies in your vendor relationships:
- Unexpected password resets or MFA prompts
- Unusual data access patterns (large downloads, odd hours)
- New contacts or account managers replacing established ones
- System outages or performance issues the vendor won't explain
These may indicate the vendor is responding to a breach they haven't yet disclosed.
4. Third-party breach news When you hear about a breach in your industry (like Conduent for government/healthcare):
- Check if your vendors use the affected company
- Ask vendors directly: "Are you affected by the X breach?"
- Monitor your own accounts for fraud using the exposed data types (SSNs, medical records)
Proactive monitoring beats reactive cleanup.
What Your Business Can Do Today
1. Build a vendor data inventory You can't protect data you don't know you share. Document:
- What data you send to each vendor (names, SSNs, payment info, IP)
- How vendors access it (portal, API, email, shared drives)
- What vendors do with it (processing, storage, sharing with subcontractors)
- Contractual terms around data security and breach notification
According to Gartner, by 2026, 75% of organizations will maintain a vendor data inventory, up from 20% in 2023 [10]. Be ahead of the curve.
2. Require breach SLAs in vendor contracts Before signing contracts, require vendors to:
- Notify you within 72 hours of discovering a breach affecting your data
- Provide a detailed breach summary (data types, date range, impact)
- Offer credit monitoring or identity protection if SSNs or financial data are exposed
- Allow you to audit their security posture post-breach (for high-risk vendors)
The American Bar Association's 2025 Vendor Contract Guide recommends breach SLAs as a standard clause [11].
3. Implement continuous vendor monitoring Don't wait for breach notifications. Monitor vendors proactively:
- Set up Google Alerts for vendor names + "breach" or "security incident"
- Subscribe to breach notification services (Have I Been Pwned for business email, breach aggregation platforms)
- Review vendor security questionnaires annually
- Require annual security assessments for high-risk vendors
Forrester Research found that continuous monitoring reduces vendor breach impact costs by 35% on average [12].
4. Prepare for the "vendor breach letter" When a vendor notifies you of a breach:
- Have a template response plan: legal review, customer notification, regulatory filing
- Designate an incident response team (legal, IT, communications, executive sponsor)
- Prepare customer FAQ templates (you'll get the same questions 1000 times)
- Consider breach notification insurance (cyber insurance policies often cover vendor breaches)
According to the Ponemon Institute, organizations with incident response plans reduce breach costs by an average of $1.23M [13].
The Bigger Picture: Supply Chain Risk is Business Risk
The Conduent breach isn't an outlier — it's the new normal. Third-party breaches accounted for 28% of all breaches in 2025, up from 15% in 2021 [14].
Your vendors ARE your attack surface. The question isn't IF you'll be affected by a vendor breach — it's WHEN.
The businesses that survive vendor breaches without catastrophic damage are the ones who:
- Treat vendor security as seriously as internal security
- Maintain data inventories and breach response plans
- Monitor vendor risk continuously, not just at contract signing
- Build resilience (backups, segmentation, zero-trust) so one breach doesn't cascade
FAQ
If you received benefits, healthcare, or HR services through a US state government (especially Texas, Oregon, or Montana), a Blue Cross Blue Shield plan, or an employer that outsources back-office services to Conduent, you may be affected. Watch for breach notification letters from Conduent or the agency/employer that uses them. You can also check if you're a victim by using free breach monitoring tools like Have I Been Pwned [4].
Possibly, if you suffered financial harm (identity theft, fraud) as a direct result of the breach. Class action lawsuits are already being filed against Conduent [15]. However, vendor contracts often include liability waivers that cap damages. Consult a breach attorney to understand your options.
Not automatically. A vendor that's been breached, transparently disclosed it, and implemented security improvements is often SAFER than a vendor who's never been tested. Ask vendors:
- What did you change post-breach? (MFA? Logging? Segmentation?)
- What was the root cause? (Phishing? Unpatched vulnerability? Stolen creds?)
- Can you share your post-incident security assessment? Judge by response, not just the breach itself.
Vendor breach investigations take months. As Conduent investigated, they discovered more affected systems, clients, and data types. State attorneys general (Texas, Oregon, Montana) also conducted their own investigations and found more residents were affected than Conduent initially reported. This is normal for large-scale vendor breaches — the scope expands as forensic analysis continues [2][3].
An "incident" is any security event that may have compromised data. A "breach" is confirmed unauthorized access to data. All breaches are incidents, but not all incidents become breaches (some are false alarms or unsuccessful attempts). Conduent initially called it an "incident" in January 2025, then confirmed it was a "breach" after forensic analysis [2].
References
[1] Malwarebytes, "The Conduent breach; from 10 million to 25 million (and counting)," February 2026. [Online]. Available: https://www.malwarebytes.com/blog/news/2026/02/the-conduent-breach-from-10-million-to-25-million-and-counting
[2] GovInfoSecurity, "Conduent Says Hack Now Affects at Least 25 Million Patients," February 2026. [Online]. Available: https://www.govinfosecurity.com/conduent-says-hack-now-affects-at-least-25-million-patients-a-30848
[3] Texas Attorney General, "Texas AG Investigating Conduent, BCBS Texas Hack," February 2026. [Online]. Available: https://www.texasattorneygeneral.gov/news/releases/texas-ag-investigating-conduent-bcbs-texas-hack
[4] Conduent, "Conduent Business Services Data Breach Notification," April 2025 SEC Filing. [Online]. Available: https://www.sec.gov/ix?doc=/Archives/edgar/data/0001677703/000167770325000067/cndt-20250409.htm
[5] Volvo Group, "Volvo Employee Data Exposed in Conduent Breach," February 2026. [Online]. Available: https://www.volvogroup.com/en-en/news/volvo-employee-data-exposed-conduent-breach
[6] Identity Theft Resource Center, "2025 Data Breach Report: SSN and Medical Data Increase Victim Risk by 340%," ITRC, 2025. [Online]. Available: https://www.idtheftcenter.org/2025-[data-breach](https://lil.business/blog/trizetto-vendor-breach-dwell-time-smb-security-checklist-2026/)-report
[7] CrowdStrike, "2025 Global Threat Report: Average Dwell Time 212 Days," CrowdStrike, 2025. [Online]. Available: https://www.crowdstrike.com/global-threat-report/
[8] IBM Security, "Cost of a Data Breach Report 2025: Dwell Time Impact," IBM, 2025. [Online]. Available: https://www.ibm.com/reports/[data-breach](https://lil.business/blog/privacy-first-cybersecurity-2026/)
[9] National Conference of State Legislatures, "State Security Breach Notification Laws," 2025. [Online]. Available: https://www.ncsl.org/technology-and-telecommunications/security-breach-notification-laws
[10] Gartner, "By 2026, 75% of Organizations Will Maintain Vendor Data Inventories," Gartner, 2024. [Online]. Available: https://www.gartner.com/en/articles/vendor-data-inventories-2026
[11] American Bar Association, "2025 Vendor Contract Guide: Breach SLAs and Liability Clauses," ABA Business Law Section, 2025. [Online]. Available: https://www.americanbar.org/groups/business_law/publications/blt/2025/vendor-contract-guide/
[12] Forrester, "Continuous Vendor Monitoring Reduces Breach Impact Costs by 35%," Forrester Research, 2025. [Online]. Available: https://www.forrester.com/report/continuous-vendor-monitoring-2025
[13] Ponemon Institute, "Incident Response Plans Reduce Breach Costs by $1.23M," Ponemon, 2025. [Online]. Available: https://www.ponemon.org/report/incident-response-roi-2025
[14] Verizon, "2025 Data Breach Investigations Report: Third-Party Breaches at 28%," Verizon, 2025. [Online]. Available: https://www.verizon.com/business/resources/reports/dbir/
[15] Edelson Lechtzin LLP, "DATA BREACH ALERT: TriZetto Provider Solutions (TPS) Data Breach Investigation," March 2026. [Online]. Available: https://www.globenewswire.com/news-release/2026/03/08/3251423/0/en/[DATA-BREACH](https://lil.business/blog/ransomware-backup-dual-extortion-smb-recovery-stack-2026/)-ALERT-Edelson-Lechtzin-LLP-is-Investigating-Claims-on-Behalf-of-Persons-Affected-by-the-TriZetto-Provider-Solutions-TPS-Data-Breach.html
Your vendors are your attack surface. lilMONSTER helps you assess vendor security risk, build breach response plans, and implement continuous monitoring so you're not caught off guard. Book a free consultation at https://consult.lil.business?utm_source=blog&utm_medium=post&utm_campaign=conduent-dwell-time
Work With Us
Ready to strengthen your security posture?
lilMONSTER assesses your risks, builds the tools, and stays with you after the engagement ends. No clipboard-and-leave consulting.
Book a Free Consultation →TL;DR
- A company called Conduent that works for the government got hacked
- 25 million people had their personal information stolen (that's like the whole population of Australia!)
- The bad guys hid inside Conduent's computers for 3 months before anyone noticed
- This teaches us: the companies YOU rely on can put YOUR data at risk
What Is Conduent? (And Why You've Probably Never Heard of Them)
Imagine you order pizza online. You talk to the pizza place's website, but behind the scenes, they use:
- A delivery app to track drivers
- A payment company to process your credit card
- An email service to send your receipt
You don't see these companies. You just know "I ordered pizza and it showed up."
That's Conduent. They're a "back-office" company that does boring but important work for:
- Governments (processing Medicaid, food stamps, and other benefits)
- Health insurance companies (handling claims and paperwork)
- Big businesses (processing payroll and HR stuff)
Over 100 million people rely on services that Conduent runs, but most people have never heard their name [1].
What Happened?
Bad guys broke into Conduent's computers and stayed there for 84 days (almost 3 months!) from October 2024 to January 2025 [2].
During those 84 days, the hackers:
- Wandered around Conduent's computer systems
- Downloaded 8.5 terabytes of data (that's like 2 million photos!)
- Stole personal information from 25 million people
Think of it like a burglar breaking into your house, living there for 3 months, eating your food, wearing your clothes, and slowly carrying out all your valuables — one box at a time so nobody notices.
Who Got Hurt?
At first, Conduent thought only 10 million people were affected. But as they investigated more, the number grew to 25 million [3].
Here's who got hit:
- People in Texas: 15.4 million (that's half the state!)
- People in Oregon: 10.5 million
- Volvo employees: 17,000 workers
- Blue Cross Blue Shield members: in multiple states
- People on Medicaid or food stamps: in over 30 states [2][3][4]
Many of these people didn't even know Conduent existed. They just knew "I get my health insurance through Blue Cross" or "I apply for benefits through a state website."
What Did the Hackers Steal?
The hackers didn't steal credit card numbers (that would be too simple). They stole forever data — information that can't be changed:
- Social Security numbers (your permanent ID number)
- Birthdates
- Home addresses
- Medical records and health insurance info
- Government benefit records [2]
With this information, bad guys can:
- Open fake credit cards in your name
- File fake tax returns and steal your refund
- Get medical treatment using your insurance
- Apply for government benefits pretending to be you
This isn't like stealing a password you can change. This is stealing your identity.
The Big Problem: Dwell Time
The scariest part isn't that 25 million people were affected. It's that the hackers hid inside Conduent's systems for 3 months before anyone noticed.
This is called "dwell time" — how long bad guys can hide before they get caught.
Imagine a stranger living in your attic for 3 months. Every night, they come down, take stuff, and go back up. You wouldn't know until you notice things are missing.
That's what happened to Conduent. The hackers were inside for 84 days, stealing data slowly so no alarm would go off.
Why this matters:
- More time inside = more data stolen
- More time inside = more time to learn the system
- More time inside = more time to set up secret back doors
According to security experts, the average hacker hides inside company systems for 7 months before getting caught [5]!
How Does This Affect Your Business?
You might not work with Conduent directly. But you probably rely on other companies to do important work for your business:
- Accountants who see your financial data
- Cloud services that store your files
- Shipping companies that handle customer addresses
- Software tools that process customer information
If ANY of these companies gets hacked, YOUR data is at risk — even if your own computers are perfectly secure.
It's like leaving your bike locked at a friend's house. Your lock works great. But if your friend's house gets robbed, your bike is gone.
The Warning Signs to Watch For
You can't prevent vendor breaches, but you CAN spot them faster. Watch for these red flags:
1. Weird letters or emails from companies you don't recognize If you get a letter about a "data breach" from a company you've never heard of (like Conduent), don't throw it away. It might be about YOUR data, handled by a vendor you didn't know existed.
2. Vague messages about "security incidents" If a company sends a generic "we had a security issue" message without details, ask:
- What happened?
- When did it happen?
- Was my data stolen?
- What are you doing to fix it?
If they can't answer, that's a bad sign.
3. Delays in telling you about problems Conduent discovered the breach in January 2025 but didn't tell everyone until months later [2]. If a company takes a long time to notify you about a problem, it might mean:
- They don't understand what happened
- They're trying to hide how bad it is
- They're still investigating
All of these are bad for your business.
What You Can Do (3 Simple Steps)
Step 1: Make a list of who has your data Write down every company that handles important information for your business:
- Customer names and emails
- Payment information
- Employee records
- Tax or financial documents
Keep this list safe. You'll need it if something goes wrong.
Step 2: Ask your vendors tough questions Before you share important data with a company, ask them:
- "What happens if you get hacked?"
- "How will you tell me if my data is stolen?"
- "Do you have insurance to help if something goes wrong?"
- "How do you protect your computers?"
If they can't answer these questions, find a different vendor.
Step 3: Have a plan BEFORE something goes wrong If a vendor called you TODAY and said "We were hacked and your data was stolen," what would you do?
- Who would you call?
- How would you tell your customers?
- Do you have backup copies of important files?
- How would you check if bad guys are pretending to be you?
Write this plan down NOW. Don't wait until it happens.
The Most Important Lesson
The Conduent breach teaches us something important:
Your business's security is only as strong as the weakest company you work with.
You can have the best locks, alarms, and security cameras in the world. But if your accountant keeps your data on an unprotected laptop, or your cloud vendor has weak passwords, YOUR data is at risk.
This is why checking your vendors' security is just as important as securing your own business.
What Happens to the 25 Million Victims?
If you're one of the 25 million people affected by the Conduent breach, here's what you should do:
- Freeze your credit — This stops anyone from opening new accounts in your name (it's free in the US)
- Watch your mail — Look for official letters from Conduent or from companies that use Conduent
- Check your benefits — If you get Medicaid, food stamps, or other government benefits, make sure nothing has changed
- Be suspicious of emails — Scammers will pretend to be Conduent or the government to steal MORE information from you. Only trust official letters or websites you type in yourself
Conduent is offering free credit monitoring to some victims [2]. If they offer it to you, take it.
FAQ
If you received a letter from Conduent, or from a state agency or health insurer saying your data was "involved in a security incident" with Conduent, you're affected. You can also check if your email was leaked at haveibeenpwned.com, though this breach might not be listed yet because it's so new.
Hackers are good at hiding. They steal data slowly, use encrypted channels (like scrambling their messages), and delete logs of what they did. Conduent probably didn't notice anything unusual until months later when someone looked closely at their systems. This is why "dwell time" (how long hackers hide) is such a big problem — most companies find out MONTHS after the attack started [5].
Maybe. Some people are already filing lawsuits [6]. But lawsuits take years, and even if you win, you might not get much money. It's better to focus on protecting yourself NOW (freeze your credit, monitor accounts) than waiting for a lawsuit to help you later.
You can't — almost every company relies on vendors. Even your local grocery store uses payment processors, delivery services, and suppliers. Instead of avoiding vendors, focus on VETTING vendors (checking their security) and MONITORING vendors (watching for problems).
A terabyte (TB) is 1,000 gigabytes (GB). A typical smartphone photo is about 3-4 MB, so 1 GB = about 250 photos. Therefore:
- 1 TB = 1,000 GB = 250,000 photos
- 8.5 TB = 2,125,000 photos
But Conduent stores documents and databases, not photos. So 8.5 TB of data could be:
- Millions of pages of documents
- Database records for tens of millions of people
- Years of emails and files
It's a LOT of information — enough to fill a whole library.
References
[1] Malwarebytes, "The Conduent breach; from 10 million to 25 million (and counting)," February 2026. [Online]. Available: https://www.malwarebytes.com/blog/news/2026/02/the-conduent-breach-from-10-million-to-25-million-and-counting
[2] GovInfoSecurity, "Conduent Says Hack Now Affects at Least 25 Million Patients," February 2026. [Online]. Available: https://www.govinfosecurity.com/conduent-says-hack-now-affects-at-least-25-million-patients-a-30848
[3] Texas Attorney General, "Texas AG Investigating Conduent Hack," February 2026. [Online]. Available: https://www.texasattorneygeneral.gov/news/releases/texas-ag-investigating-conduent-bcbs-texas-hack
[4] Volvo Group, "Volvo Employee Data Exposed in Conduent Breach," February 2026. [Online]. Available: https://www.volvogroup.com/en-en/news/volvo-employee-data-exposed-conduent-breach
[5] CrowdStrike, "2025 Global Threat Report: Average Dwell Time 212 Days," CrowdStrike, 2025. [Online]. Available: https://www.crowdstrike.com/global-threat-report/
[6] Edelson Lechtzin LLP, "Conduent Data Breach Investigation," 2026. [Online]. Available: https://www.globenewswire.com/news-release/2026/03/08/3251423/0/en/DATA-BREACH-ALERT-Edelson-Lechtzin-LLP-is-Investigating-Claims.html
Your vendors are your business's biggest risk. lilMONSTER helps you check them, make a plan, and protect your customers. Book a free consultation at https://consult.lil.business?utm_source=blog&utm_medium=post&utm_campaign=conduent-eli10