Credit: WaveGenerics/Pixabay
The hacking group Crimson Collective claims to have obtained the personal data of more than a million residential customers of U.S. fiber broadband provider Brightspeed.
In a January 4 Telegram post, the group behind a Red Hat GitLab breach last year claimed to possess “over 1m+ residential user PII’s,” or personally identifiable information.
Crimson Collective said it would release a data sample on January 5 to give Brightspeed “some time first to answer to us.” It is not known what if any communications occurred between the company and the hacker group, but Crimson Collective made good on that threat and released the data sample today.
Crimson Collective claims to possess a wide range of data on Brightspeed customers, including:
In an email exchange with The Cyber Express, a Crimson Collective spokesperson noted that while the data doesn’t include password or credit card data that could put users at imminent risk of breach or theft, the group said that “Every PII is important, with all this data people can easily start big sophisticated phishing campaigns or even get access to specific people’s infrastructure.”
Asked if the group has established persistent access to Brightspeed’s environment, the spokesperson replied, “Cannot disclose this.”
The Cyber Express also reached out to Brightspeed for comment and will update this article with any response. However, the company reportedly told Security Week that it is “currently investigating reports of a cybersecurity event. As we learn more, we will keep our customers, employees and authorities informed. We take the security of our networks and protection of our customers’ and employees’ information seriously and are rigorous in securing our networks and monitoring threats.”
The FBI is warning that that the North Korean threat group Kimsuky is targeting organizations with spearphishing campaigns using malicious…
The Cyber Express covers cybersecurity: Higham Lane attack, corporate breaches, and UK reforms highlight global cyber risks in early 2026.
A DNS Crash on January 8, 2026 caused global reboot loops in Cisco Small Business Switches, impacting CBS250, C1200, and…
Penetration testing simulates real cyberattacks to uncover vulnerabilities. Learn the penetration testing meaning, tools, process, and importance.
A 16-year-old Microsoft PowerPoint flaw and a new maximum-severity HPE vulnerability are the latest additions to CISA’s Known Exploited Vulnerabilities…
The report concluded that the public sector must “catch up with the acute cyber threat it faces” to protect services…
This website uses cookies. By continuing to use this website you are giving consent to cookies being used.
Read More