Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks

March 14, 2026

Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer

March 14, 2026

Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalog

March 14, 2026
Facebook X (Twitter) Instagram
Saturday, March 14
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Ericsson Breach Exposes Data of 15k Employees and Customers
Cyber Security

Ericsson Breach Exposes Data of 15k Employees and Customers

Team-CWDBy Team-CWDMarch 11, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A data breach affecting 15,661 Ericsson Inc. employees and customers has been disclosed after attackers compromised a third-party service provider used by the company.

The incident involved unauthorised access to files containing personal information, according to breach notifications filed with US state authorities.

Ericsson Inc. is the US subsidiary of Swedish telecommunications and networking firm, Telefonaktiebolaget LM Ericsson. The Stockholm-headquartered company employs nearly 90,000 people globally and provides network infrastructure, software and services to telecom operators.

The breach was reportedly detected on April 28, 2025, when the service provider identified suspicious activity on its systems. Investigators later determined that files may have been accessed without permission between April 17 and April 22, 2025.

Investigation and Scope of the Incident

The  Ericsson Inc. launched an investigation with the assistance of external cybersecurity specialists and also notified the FBI. A detailed review of potentially affected files was completed on February 23, confirming that personal information belonging to Ericsson employees and customers had been exposed.

“Based on the investigation, our service provider determined that a limited subset of files may have been accessed or acquired without authorization,” the company said. “As part of its investigation, it retained external data specialists to conduct a comprehensive review of the [potentially] affected files.”

Read more on data breaches: The 10 Biggest Data Breach Fines and Settlements of 2025

A filing with the Texas Attorney General on March 9 indicated that 4377 state residents were among those impacted. While the total number of affected individuals stands at 15,661, Ericsson noted that investigators have not identified evidence that the stolen information has been misused.

The types of data potentially exposed include:

  • Names and addresses

  • Social Security Numbers

  • Driver’s licence or government-issued identification numbers

  • Financial information, such as bank or card numbers

  • Medical information and dates of birth

Identity Protection Measures Offered

Ericsson said the breach did not occur within its own systems but at a vendor responsible for storing certain employee and customer data. The company has not disclosed the identity of the service provider involved.

At present, no cybercrime group has publicly claimed responsibility for the data breach.

To assist those affected, Ericsson is offering complimentary identity protection services through IDX. These include credit monitoring, dark web monitoring, identity theft recovery assistance and a $1m identity fraud reimbursement policy for individuals who enrol by June 9.

“Please note that our service provider has represented to us that they have no evidence of the misuse of any potentially impacted information since the time of the incident,” the company said in its notification letter.

Image credit: davide bonaldo / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleOnly 24% Of organizations Test Identity Recovery Every Six Months
Next Article Google Develops Merkle Tree Certificates to Enable Quantum-Resistant HTTPS in Chrome
Team-CWD
  • Website

Related Posts

Cyber Security

Why the EU Vulnerability Database Is a Blueprint For The Future

March 14, 2026
Cyber Security

What CISOs Should Know (And Do) About OpenClaw

March 13, 2026
Cyber Security

Expanded Identity Attack Vectors: From Document Fraud to Signal Manipu

March 12, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Near-ultrasonic attacks on voice assistants

September 11, 20256 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

How chatbots can help spread scams

October 14, 2025

It’s all fun and games until someone gets hacked

September 26, 2025

2025’s most common passwords were as predictable as ever

January 21, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.