Crimson Collective Claims Breach of U.S. Fiber Broadband Provider Brightspeed

The hacking group Crimson Collective claims to have obtained the personal data of more than a million residential customers of U.S. fiber broadband provider Brightspeed.

In a January 4 Telegram post, the group behind a Red Hat GitLab breach last year claimed to possess “over 1m+ residential user PII’s,” or personally identifiable information.

Crimson Collective said it would release a data sample on January 5 to give Brightspeed “some time first to answer to us.” It is not known what if any communications occurred between the company and the hacker group, but Crimson Collective made good on that threat and released the data sample today.

Crimson Collective Details Brightspeed Claims

Crimson Collective claims to possess a wide range of data on Brightspeed customers, including:

  • Customer account master records containing names, email addresses, phone numbers, billing and service addresses, and account status
  • Network type, consent flags, billing system, service instance, network assignment, and site IDs
  • Address qualification responses with address IDs, full postal addresses, latitude and longitude coordinates, qualification status (fiber/copper/4G), maximum bandwidth, drop length, wire center, marketing profile codes, and eligibility flags
  • User-level account details keyed by session/user IDs, “overlapping with PII including names, emails, phones, service addresses, account numbers, status, communication preferences, and suspend reasons”
  • Payment history, including payment IDs, dates, amounts, invoice numbers, card types and masked payment card numbers (last 4 digits), gateways, and status
  • Payment methods per account, including default payment method IDs, gateways, masked credit card numbers, expiry dates, bank identification numbers (BINs), holder names and addresses, status flags (Active/Declined), and created/updated timestamps
  • Appointment and order records by billing account, including order numbers, status, appointment windows, dispatch and technician information, and install types.

Potential Risk for Brightspeed Users

In an email exchange with The Cyber Express, a Crimson Collective spokesperson noted that while the data doesn’t include password or credit card data that could put users at imminent risk of breach or theft, the group said that “Every PII is important, with all this data people can easily start big sophisticated phishing campaigns or even get access to specific people’s infrastructure.”

Asked if the group has established persistent access to Brightspeed’s environment, the spokesperson replied, “Cannot disclose this.”

The Cyber Express also reached out to Brightspeed for comment and will update this article with any response. However, the company reportedly told Security Week that it is “currently investigating reports of a cybersecurity event. As we learn more, we will keep our customers, employees and authorities informed. We take the security of our networks and protection of our customers’ and employees’ information seriously and are rigorous in securing our networks and monitoring threats.”

Paul Shread

Paul Shread, International Editor for The Cyber Express and Cyble, has covered nearly every aspect of enterprise technology in his 25 years in IT journalism, including award-winning articles on endpoint security and virtual data centers, and a report exposing critical security flaws in a major SIEM system. Publications he has edited and written for include eSecurity Planet, Datamation, eWeek, IT Business Edge, Webopedia, and many more. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds market analyst, cybersecurity, and analytics certifications. You can follow him on LinkedIn at: https://www.linkedin.com/in/paul-shread/

Recent Posts

North Korean Kimsuky Threat Actors Use Malicious QR Codes to Target Foreign Policy Experts

The FBI is warning that that the North Korean threat group Kimsuky is targeting organizations with spearphishing campaigns using malicious…

7 hours ago

The Cyber Express Weekly Roundup: Schools, Hacktivists, and National Cyber Overhauls

The Cyber Express covers cybersecurity: Higham Lane attack, corporate breaches, and UK reforms highlight global cyber risks in early 2026.

15 hours ago

Global DNS Crash Triggers Reboot Loops Across Cisco Small Business Switches

A DNS Crash on January 8, 2026 caused global reboot loops in Cisco Small Business Switches, impacting CBS250, C1200, and…

17 hours ago

What Is Penetration Testing: Tools, Process, and Importance

Penetration testing simulates real cyberattacks to uncover vulnerabilities. Learn the penetration testing meaning, tools, process, and importance.

18 hours ago

CISA Warns of Attacks on PowerPoint and HPE Vulnerabilities

A 16-year-old Microsoft PowerPoint flaw and a new maximum-severity HPE vulnerability are the latest additions to CISA’s Known Exploited Vulnerabilities…

1 day ago

UK Moves to Close Public Sector Cyber Gaps With Government Cyber Action Plan

The report concluded that the public sector must “catch up with the acute cyber threat it faces” to protect services…

2 days ago

This website uses cookies. By continuing to use this website you are giving consent to cookies being used.

Read More