How Conduent's "10 Million Victim" Breach Quietly Became 25 Million—And Counting
**Four months ago, America learned that 10.5 million people lost their Social Security numbers in a government contractor breach. That number was a lie. The real count? At least 25 million victims and growing—with Texas alone exposing 15.4 million residents. Here's how a "limited cyber incident" became the largest government contractor data breach in American history.**
* * *
## Executive Summary
In October 2025, Conduent Inc. disclosed that a data breach had exposed the personal information of 10,515,849 Americans. It was a staggering number—the eighth-largest healthcare data breach in U.S. history. Regulators expressed concern. Media covered the story. Then the news cycle moved on.
Conduent Data Breach Balloons: Millions More Americans Affected in Expanding Government Services CompromiseWhat started as a “limited” cybersecurity incident at government technology giant Conduent has exploded into one of the largest data breaches in U.S. history. Originally reported as affecting around 4 million people, the breach count has now surged past 25.9 million Americans—and the final number could beBreached CompanyBreached Company
That was a mistake.
By February 2026, the true scale of the Conduent breach has emerged: **at least 25 million victims** , with new state disclosures still arriving. Texas alone has revised its count from approximately 4 million to a jaw-dropping **15.4 million residents** —nearly half the state's population. Additional states including Delaware, Massachusetts, and New Hampshire have now filed their own breach notifications, adding millions more to the toll.
The Conduent breach isn't just getting worse. It's revealing a pattern: massive data incidents where the initial disclosure is the floor, not the ceiling. Every month, new filings surface. Every month, the numbers climb. And throughout it all, Conduent's response has been reactive at best—only offering identity protection services after months of public pressure and mounting legal scrutiny.
This is the story of how America's invisible government contractor exposed 25 million Social Security numbers—and why that number will almost certainly grow.
* * *
## The Ballooning: From "10 Million" to 25 Million in 4 Months
### October 2025: The "Final" Count
When Conduent filed its breach notification with the Oregon Department of Justice on October 24, 2025, the number seemed definitive: **10,515,849 individuals affected**. Reporters rounded to "10.5 million." Analysts called it the eighth-largest healthcare breach in American history. Texas Attorney General Ken Paxton cited "approximately 4 million Texans" affected.
The figure came from Conduent's own forensic investigation. Surely, nine months after discovery, the company knew the full extent of the damage.
They didn't. Or if they did, they weren't telling.
### February 2026: The Real Numbers Emerge
On February 5, 2026, TechCrunch published a bombshell report that shattered the October narrative. Based on new state attorney general filings and regulatory disclosures, the actual victim count had **more than doubled** :
What We Were Told (Oct 2025)| What We Now Know (Feb 2026)
---|---
10.5 million total victims| **25+ million total victims**
~4 million Texans| **15.4 million Texans**
Texas, Montana, Oregon, Maine| **+ Delaware, Massachusetts, New Hampshire**
"Limited cyber incident"| Largest government contractor breach ever
That's not a minor revision. The October disclosure undercounted victims by **more than 15 million people** —a 150% error. To put it another way: for every two victims Conduent acknowledged, there was a third person they hadn't mentioned.
### Texas: From 4 Million to 15.4 Million
No state demonstrates the ballooning phenomenon more dramatically than Texas.
**October 2025 disclosure:** "Approximately 4 million Texans affected"
**February 2026 reality:** **15.4 million Texans affected**
That's not 4 million Texans. That's **half the population of Texas.** More people than live in 40 U.S. states. More than the combined populations of Wyoming, Vermont, Alaska, North Dakota, South Dakota, Delaware, Montana, Rhode Island, Maine, New Hampshire, Hawaii, West Virginia, Idaho, and Nebraska.
The revised number means that if you know anyone in Texas who has interacted with government services—Medicaid, SNAP benefits, healthcare claims—there's a coin-flip chance their Social Security number is compromised.
### The New States
October's disclosure mentioned Texas, Montana, Oregon, and Maine. By February 2026, the list had expanded:
**Delaware:** Newly disclosed, victim count pending
**Massachusetts:** Notification filed, adding to the toll
**New Hampshire:** Attorney General notification confirms SSN exposure
And these are just the states with proactive disclosure requirements. Others may have affected residents but weaker reporting mandates—meaning we still don't know the full picture.
### Why the Numbers Keep Growing
The ballooning isn't a bug in the disclosure process. It's a feature.
When companies experience data breaches, they face competing pressures:
* **Legal teams** want to minimize disclosed scope to limit liability
* **Forensic investigations** take months to complete
* **State notification deadlines** vary (30-90 days typically)
* **Victim identification** is genuinely difficult across fragmented systems
The result? Initial disclosures represent the minimum defensible number. As investigations continue and additional data sources are analyzed, that floor rises—often dramatically.
Conduent's data doesn't live in one neat database. It's scattered across systems serving different clients: Blue Cross Blue Shield of Texas, Blue Cross Blue Shield of Montana, state Medicaid programs, government agencies. Each system requires separate analysis. Each analysis reveals more victims.
This is why October's "definitive" count of 10.5 million became February's 25 million. And it's why 25 million almost certainly isn't the final number either.
Conduent Ransomware Attack: SafePay Gang Exfiltrates 8.5TB of Data Impacting Over 10.5 Million AmericansThe Breach That Shook Healthcare and Government Services Across 46 States In what has become the largest healthcare data breach of 2025, business process outsourcing giant Conduent Business Solutions has confirmed that a sophisticated ransomware attack by the emerging SafePay cybercrime group compromised the sensitive personal and medical information ofBreached CompanyBreached Company
* * *
## The Hidden Giant Behind Government Services
Before diving deeper into the breach itself, understanding Conduent's role in American infrastructure is essential to grasping why this disaster matters.
### Who Is Conduent?
Conduent Incorporated, headquartered in Florham Park, New Jersey, is a $4 billion technology services company that most Americans have never heard of—yet whose systems touch their lives daily. Spun off from Xerox in January 2017, Conduent employs over 54,000 people across 24 countries and trades on the NASDAQ under the ticker CNDT as a Russell 2000 component.
The company's anonymity belies its importance. Conduent is what industry insiders call a "govtech giant"—a critical infrastructure provider that handles back-office operations for government agencies and healthcare organizations that lack the technical capacity to manage these functions in-house.
### Services That Touch Millions
Conduent's service portfolio reads like a list of America's most sensitive data processing operations:
**Healthcare Services:**
* Medical claims processing and billing
* Health plan enrollment and administration
* Patient support services
* Protected Health Information (PHI) management
**Government Benefits Processing:**
* Medicaid screening and enrollment
* Social Security disbursement processing
* SNAP (Supplemental Nutrition Assistance Program) benefits administration
* Prepaid card processing for welfare payments
**Public Infrastructure:**
* Electronic toll collection systems
* Automatic fare collection for public transit
* Document processing and mailroom services for government agencies
In simpler terms: when a Medicaid recipient visits a doctor, when a Social Security beneficiary receives their monthly payment, when a struggling family uses their SNAP benefits at a grocery store—Conduent's systems are often working behind the scenes.
### The Client Network
This breach didn't just affect Conduent. It cascaded across a network of healthcare and government entities that trusted Conduent with their most sensitive data:
* **Blue Cross Blue Shield of Texas** — 15.4 million affected (under investigation)
* **Blue Cross Blue Shield of Montana** — 462,000 members affected
* **State Medicaid programs** across multiple states
* **Government agencies** requiring secure document processing
* **Healthcare plans** nationwide that contract with Conduent for claims processing
When you breach Conduent, you don't just compromise one company's data. You compromise the entire ecosystem of government and healthcare organizations that depend on its services. This is the terrifying reality of third-party vendor risk in the digital age—and it's precisely what happened.
* * *
## The Breach: Three Months of Undetected Access
### Initial Compromise: October 21, 2024
According to Conduent's official disclosures, the breach began on October 21, 2024, when an unauthorized third party gained access to the company's systems. The nature of this initial access—whether through phishing, exploitation of a vulnerability, or other means—has not been publicly disclosed.
According to TechCrunch, the Safeway ransomware gang has claimed responsibility for the attack, allegedly exfiltrating **over 8 terabytes of data** during their extended access.
### 84 Days of Data Exfiltration
For 84 days—nearly three full months—the attackers maintained persistent access to Conduent's environment. During this period, they navigated through systems containing some of the most sensitive data imaginable:
* **Social Security numbers** — the skeleton key to identity theft
* **Protected Health Information** — medical records, diagnoses, treatment histories
* **Health insurance details** — policy numbers, coverage information
* **Personal identifiers** — full names, addresses, dates of birth
The files exfiltrated contained data that had "come into Conduent's possession through its services to health plans," according to official breach notifications. This means the breach affected not only current health plan members but also former members whose data Conduent had retained—potentially dating back years.
### Discovery: January 13, 2025
On January 13, 2025, Conduent finally detected the intrusion and took action to secure its networks. The company immediately engaged third-party forensic experts and notified federal law enforcement.
In its official statement, Conduent characterized the incident in measured corporate language:
> "On January 13, 2025, we discovered that we were the victim of a cyber incident that impacted a limited portion of our network. Upon discovery, we immediately secured our networks and initiated an investigation with the assistance of third-party forensic experts."
That phrase—"limited portion of our network"—would prove to be the understatement of the year. Twenty-five million victims later, it reads as either willful minimization or catastrophic self-deception.
Blue Cross Blue Shield of Montana Data Breach: 462,000 Members Exposed in Conduent CyberattackMontana State Investigation Launched as Third-Party Vendor Breach Impacts One-Third of State’s Population October 26, 2025 — Blue Cross Blue Shield of Montana (BCBSMT) has become the latest healthcare organization to disclose a massive data breach affecting approximately 462,000 current and former members—nearly one-third of Montana’s entire population. TheBreached CompanyBreached Company
* * *
## The Notification Scandal: Nine Months of Silence
One of the most troubling aspects of the Conduent breach is the timeline between discovery and victim notification.
### The Gap
* **Breach discovered:** January 13, 2025
* **Victim notifications begin:** October 2025
* **Time elapsed:** Approximately 9 months
For nine months, more than 25 million Americans walked around with compromised Social Security numbers and exposed health information—and they had no idea.
### Why It Matters
In identity theft, time is everything. The sooner victims know their data has been compromised, the sooner they can:
* Place fraud alerts on their credit reports
* Freeze their credit
* Monitor their accounts for suspicious activity
* Be alert to phishing attempts using their stolen information
* Report suspicious activity to law enforcement
Nine months is an eternity in this context. Criminals who obtained this data in late 2024 or early 2025 had the better part of a year to exploit it before victims received their first warning. By the time those notification letters arrived, the damage may already have been done.
### Legal and Ethical Questions
While breach notification timing can be legitimately extended when law enforcement requests delays to support an investigation, nine months raises serious questions:
* Was this timeline necessary, or did it reflect corporate prioritization of liability management over victim protection?
* Did Conduent comply with state-specific notification deadlines, which typically range from 30 to 90 days?
* Should federal regulators mandate stricter notification timelines for breaches of this scale?
* * *
## The Delayed Response: Identity Protection Finally Offered—After Public Pressure
One of the most troubling aspects of the Conduent breach response was how long it took to offer basic victim protections.
### Initial Response: Nothing
When breach notifications first went out in October 2025, affected individuals received alarming news about their exposed Social Security numbers and health records—but no offer of identity protection services. The Maine breach filing from that period explicitly confirmed: **"No identity theft protection services are offered."**
For months, 10+ million Americans were told their most sensitive data had been stolen, and they were on their own.
### The Reversal: 2 Years of Credit Monitoring
Only after the true scale emerged—25+ million victims, mounting public pressure, and the Texas Attorney General investigation—did Conduent reverse course. The company is now offering:
* **2 years of free credit monitoring** through a third-party service
* Enrollment deadline: **March 31, 2026**
The company's breach notice provides a phone number for enrollment: **(866) 291-3678** , available Monday through Friday, 9am to 6:30pm Eastern Time.
### Too Little, Too Late?
While credit monitoring is better than nothing, the delayed response raises serious questions:
* **Why did it take months** and public pressure to offer standard protections?
* **Is two years enough** when SSNs are exposed forever?
* **Will victims even know** to enroll before the March 31 deadline?
For Medicaid recipients—low-income Americans by definition—navigating enrollment processes and understanding credit monitoring can be challenging. These are people who qualified for government assistance precisely because of financial hardship. Many may miss the enrollment deadline entirely, leaving them without protection despite being entitled to it.
* * *
## The Texas Attorney General Investigation
### Ken Paxton Takes the Lead
Texas Attorney General Ken Paxton's February 12, 2026 announcement transformed the Conduent breach from a cybersecurity incident into a political flashpoint. With 15.4 million Texans affected—nearly half the state's population—Paxton framed the investigation in stark terms:
> "The Conduent data breach was likely the largest breach in U.S. history. If any insurance giant cut corners or has information that could help us prevent breaches like this in the future, I will work to uncover it. Texans deserve to know that their private health information is being handled responsibly and in full compliance with the law."
With the updated victim count, Paxton's characterization is no longer disputed. Twenty-five million victims makes this one of the largest data breaches ever—and the largest affecting a government contractor.
### What the Investigation Seeks
The Civil Investigative Demands issued to both BCBS of Texas and Conduent are designed to uncover:
1. **Security practices** prior to the breach—did the companies maintain adequate safeguards?
2. **Breach detection and response** —why did it take 84 days to detect the intrusion?
3. **Notification timelines** —why were victims not notified until October 2025, nine months after discovery?
4. **Compliance with Texas law** —did the companies meet their legal obligations under state data protection statutes?
### Texas Medicaid Recipients at the Center
The investigation has particularly focused on Texas Medicaid recipients whose data was exposed. Medicaid serves low-income individuals, families with children, pregnant women, the elderly, and people with disabilities. These are populations that are often already navigating challenging circumstances—and now face the additional burden of potential identity theft.
Texas operates one of the nation's largest Medicaid programs, serving over 4 million individuals in a typical year. With 15.4 million Texans exposed, the breach affects far more than just Medicaid recipients—but they represent the most vulnerable subset of an already massive victim pool.
* * *
## State-by-State Impact Analysis
### The Complete Picture (As of February 2026)
State| Affected Individuals| % of State Population| Status
---|---|---|---
**Texas**| 15,400,000| ~50%| AG Investigation
**Montana**| 462,000| ~40%| Insurance Commission Investigation
**Delaware**| Newly disclosed| TBD| Notification filed
**Massachusetts**| Newly disclosed| TBD| Notification filed
**New Hampshire**| Disclosed| TBD| AG notification confirms SSN exposure
**Oregon**| Included in total| TBD| Initial filing location (10.5M figure)
**Maine**| 374| <1%| Notification filed
**Other States**| Unknown| Unknown| Likely affected, no disclosure
**TOTAL**| **25,000,000+**| —| And growing
### Texas: Half a State Compromised
* **Affected individuals:** 15,400,000
* **Percentage of total:** ~62% of known victims
* **Key entity:** Blue Cross Blue Shield of Texas
* **Populations affected:** Medicaid recipients, BCBS members, healthcare claimants
* **Regulatory action:** Attorney General investigation underway
The Texas numbers dwarf everything else. With 15.4 million affected residents, the breach touches essentially every extended family in the state. If you live in Texas and haven't been directly affected, someone you know almost certainly has been.
### Montana: Disproportionate Impact
* **Affected individuals:** 462,000
* **Percentage of state population:** ~40%
* **Key entity:** Blue Cross Blue Shield of Montana
* **Regulatory action:** Insurance and Securities Commission investigation
While Montana's raw numbers are smaller, the proportional impact is arguably worse. When 40% of a state's population has their sensitive data exposed, virtually every extended family is affected.
### The New States
**Delaware, Massachusetts, and New Hampshire** have all filed new breach notifications since the October disclosure. Full victim counts haven't been released for all states, but each filing adds to the national toll—and suggests that Conduent's initial 10.5 million count was severely incomplete.
### Other States: Unknown but Inevitable
Given that Conduent serves government and healthcare organizations nationwide, additional state victims are certain. However, not all states have equally rigorous breach disclosure requirements, meaning the full state-by-state breakdown may never be publicly known.
* * *
## A Pattern of Security Failures
The 2024-2025 breach is not Conduent's first encounter with sophisticated cybercriminals.
### The 2020 Maze Ransomware Attack
In 2020, Conduent's European operations were targeted by the Maze ransomware group—one of the most notorious criminal hacking organizations of its era. Maze was known for its "double extortion" tactics: encrypting victim data while simultaneously threatening to publish stolen files if ransom demands weren't met.
Conduent acknowledged the attack, claiming that "most systems" were restored within eight hours. However, Maze publicly announced the breach and provided proof of the intrusion, suggesting the attack was more significant than Conduent initially acknowledged.
### What the History Suggests
Two major cybersecurity incidents within five years raises uncomfortable questions:
1. **Institutional security culture:** Has Conduent invested adequately in cybersecurity defenses?
2. **Lessons learned:** Did the 2020 attack prompt security improvements, or were underlying vulnerabilities left unaddressed?
3. **Target profile:** Conduent's vast trove of government and healthcare data makes it a high-value target—is the company's security posture commensurate with this threat level?
The Texas Attorney General's investigation specifically seeks to determine whether Conduent "cut corners" on security. The 2020 precedent provides context for that inquiry.
* * *
## Government Contractor Security: A Systemic Crisis
The Conduent breach is a symptom of a deeper problem: the federal government and state agencies have outsourced critical data processing to private contractors whose security practices may not match the sensitivity of the data they handle.
### The Third-Party Vendor Problem
Government agencies increasingly rely on contractors like Conduent for technical operations they lack the capacity to perform in-house. This creates a fundamental tension:
* **Government data** subject to strict security requirements and oversight
* **Private contractors** whose primary obligation is to shareholders
* **Accountability gaps** when breaches occur
When Conduent is breached, the victims are Americans who interacted with their government—Medicaid applicants, Social Security beneficiaries, SNAP recipients. But the liability lies with a private corporation over which those Americans have no direct recourse.
### The Downstream Cascade
Consider the chain of responsibility:
1. **A Texas Medicaid recipient** provides personal information to apply for benefits
2. **The Texas Medicaid program** shares that information with Blue Cross Blue Shield of Texas for claims processing
3. **BCBS of Texas** contracts with Conduent for back-office support
4. **Conduent** is breached, exposing the recipient's data
The original Medicaid recipient likely has no idea Conduent exists, yet their Social Security number is now potentially in criminal hands. This is the hidden cost of government outsourcing: the public bears the risk of private sector security failures.
### Critical Infrastructure Questions
Conduent's role in processing government benefits—Social Security, Medicaid, SNAP—raises the question of whether such companies should be designated as critical infrastructure and held to higher security standards.
After the Conduent breach, regulators and legislators should consider:
* **Mandatory security audits** for contractors handling sensitive government data
* **Stricter breach notification timelines** for incidents affecting public benefits recipients
* **Required victim protection services** when SSNs are exposed
* **Clear liability frameworks** for downstream breaches affecting government constituents
* * *
## Where Do Victims Go From Here?
For the 25+ million Americans affected by the Conduent breach, the path forward is unclear and largely self-directed.
### Immediate Steps Victims Should Take
**1. Assume the worst.** If you've interacted with Texas Medicaid, Blue Cross Blue Shield of Texas, Blue Cross Blue Shield of Montana, or any government benefits program that might use Conduent's services, consider your data compromised.
**2. Place fraud alerts.** Contact any of the three credit bureaus (they're required to notify the other two):
* Equifax: 1-800-525-6285
* Experian: 1-888-397-3742
* TransUnion: 1-800-680-7289
**3. Consider a credit freeze.** A freeze prevents new accounts from being opened in your name. It's free and can be lifted temporarily when you need to apply for credit.
**4. Monitor your accounts.** Check credit card and bank statements for unauthorized transactions. Review medical bills and insurance Explanation of Benefits statements for services you didn't receive.
**5. File your taxes early.** Tax identity theft—where criminals file fraudulent returns using your SSN—is a major risk. Filing early reduces the window for fraud.
**6. Be alert to phishing.** Criminals may use your exposed information to craft convincing scam emails, calls, or texts. Verify any communication claiming to be from government agencies or healthcare providers.
### The Litigation Path
Given the scale of this breach and Conduent's failure to offer identity protection services, class action litigation is virtually certain. Affected individuals may wish to:
* Monitor for class action announcements
* Consult with attorneys specializing in data breach litigation
* Document any evidence of identity theft or fraud that may result from the breach
### Contact Information
For those wishing to contact Conduent directly:
**Conduent Data Incident Call Center**
Phone: (866) 291-3678
Hours: Monday–Friday, 9am–6:30pm ET
Website: conduent.com/notice-2913678/
* * *
## The Regulatory Reckoning Ahead
The Conduent breach is not over. Multiple investigations are underway, and additional regulatory action seems inevitable.
### Active Investigations
**Texas Attorney General**
* Status: Civil Investigative Demands issued February 12, 2026
* Focus: Security practices, compliance with Texas law
* Targets: Conduent and Blue Cross Blue Shield of Texas
**Montana Insurance and Securities Commission**
* Status: Investigation ongoing
* Focus: Notification delays
* Potential: Court proceedings possible
### Likely Future Developments
**Additional state investigations:** With 25+ million victims across multiple states, California, Florida, New York, and other large states may launch their own inquiries.
**Federal regulatory attention:** HHS Office for Civil Rights (which enforces HIPAA) may initiate a compliance investigation given the protected health information exposure.
**Legislative hearings:** Breaches of this magnitude often prompt congressional attention, particularly given the government contractor angle.
**Class action certification:** One or more class actions will likely be filed seeking damages for affected individuals.
### Financial Impact
For a company with $4 billion in annual revenue, a breach affecting 25+ million people represents existential risk. Costs will include:
* Forensic investigation expenses
* Legal defense costs across multiple jurisdictions
* Potential regulatory fines
* Possible class action settlements
* Reputational damage affecting future government contracts
* * *
## Why the "Ballooning" Story Matters
The evolution of the Conduent breach—from 10.5 million to 25+ million victims in four months—isn't just a numbers story. It reveals fundamental problems with how data breaches are disclosed and understood.
### Pattern Recognition
Conduent isn't the first breach to balloon. The Change Healthcare attack of 2024 followed a similar pattern, with victim counts rising from initial estimates to over 100 million. The Anthem breach of 2015 saw scope expand as investigations continued.
The pattern suggests that **initial breach disclosures should be treated as floor estimates, not ceiling counts**. When a company says "10 million affected," the public and regulators should mentally prepare for that number to double.
### Implications for Victims
If you received a breach notification letter from Conduent in October 2025, you were told the breach affected 10.5 million people. You might have thought, "At least I'm not alone"—but you were given a fundamentally misleading picture of the breach's scope.
Today, you know you're one of 25+ million victims. That changes the threat landscape: more data in criminal hands means more sophisticated fraud schemes, more identity theft attempts, more chaos.
### Implications for Policy
Current breach disclosure requirements allow this drip-drip-drip pattern. Companies can file initial notifications with their best estimates, then file amendments as investigations reveal more victims.
Perhaps that's unavoidable—investigations take time. But the Conduent case suggests that initial disclosures should be required to include disclaimers: _"This count is preliminary. Expect significant revisions as our investigation continues."_
Victims deserve to know not just that they're affected, but that the scope of their exposure may be far worse than initially reported.
* * *
## Conclusion: A Breach That Keeps Getting Worse
The Conduent data breach began as a "limited cyber incident" affecting an unspecified number of people. Then it was 10.5 million. Now it's 25 million and counting.
At every stage, Conduent's disclosures have understated the damage. At every stage, victims have been left without identity protection. At every stage, the Americans most reliant on government services—Medicaid recipients, Social Security beneficiaries, families on food assistance—have borne the consequences of corporate security failures.
Twenty-five million Social Security numbers. Twenty-five million names, addresses, dates of birth, and medical records. And the company responsible offers nothing but a phone number.
The Texas Attorney General is investigating. The Montana Insurance Commission is investigating. Class action attorneys are circling. But for the 25 million victims, those proceedings are abstractions. What matters is that their most sensitive data is in criminal hands, the company that lost it won't help them, and the numbers just keep growing.
This is what happens when government services are outsourced to private contractors with inadequate security. This is what happens when breach disclosure rewards minimization over transparency. This is what happens when corporate liability concerns outweigh victim protection.
The Conduent breach isn't over. The numbers will keep climbing. And 25 million Americans will keep checking their credit reports, watching for fraud, and wondering when the other shoe will drop.
They deserve better. They're not going to get it.
* * *
## Timeline: The Ballooning Breach
Date| Event| Victim Count
---|---|---
October 21, 2024| Unauthorized access begins| —
January 13, 2025| Breach discovered, investigation starts| —
January 2025| Initial disclosure: "limited cyber incident"| "Unknown"
October 2025| Notifications begin (~9 months post-discovery)| —
October 24, 2025| Oregon DOJ filing| **10,515,849**
October 24, 2025| Maine notification: no protection offered| 10.5M+
December 2025| Media confirms SSN exposure at scale| 10.5M+
February 5, 2026| TechCrunch reveals true scope| **25,000,000+**
February 5, 2026| Texas revised to 15.4 million| 25M+
February 2026| Delaware, MA, NH file notifications| 25M+ (growing)
February 12, 2026| Texas AG Paxton launches investigation| 25M+
Future| Additional states expected| **Higher**
* * *
## By the Numbers
* **25,000,000+** — Current confirmed victims (and growing)
* **10,515,849** — October 2025 disclosed count (now known to be severely understated)
* **15,400,000** — Texas residents affected (revised from ~4 million)
* **150%** — Amount the October victim count undercounted reality
* **84 days** — Duration of unauthorized access (Oct 21, 2024 – Jan 13, 2025)
* **~9 months** — Time between breach discovery and victim notification
* **8 TB** — Data allegedly exfiltrated (per Safeway ransomware gang)
* **$0** — Value of identity protection offered to victims
* **6+** — States with confirmed affected residents
* **54,000** — Conduent employees worldwide
* **$4.14 billion** — Conduent's annual revenue
* * *
_Sources: TechCrunch (Feb 5, 2026), Oregon DOJ Consumer Protection Division, Maine Attorney General, New Hampshire Attorney General, Texas Attorney General Office_
_If you believe you may have been affected by the Conduent breach, monitor your credit reports and consider placing a fraud alert or credit freeze immediately. Contact the Conduent Data Incident Call Center at (866) 291-3678 for more information._
* * *