Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Inside the Chip: Rethinking Cybersecurity from the Ground Up

January 8, 2026

Hackers Claim to Disconnect Brightspeed Customers After Breach

January 8, 2026

Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia

January 8, 2026
Facebook X (Twitter) Instagram
Thursday, January 8
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Hackers Claim to Disconnect Brightspeed Customers After Breach
News

Hackers Claim to Disconnect Brightspeed Customers After Breach

Team-CWDBy Team-CWDJanuary 8, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A US internet service provider (ISP) is scrambling to investigate a recent security breach in which threat actors claim to have obtained information on over one million customers and disrupted their connectivity.

Brightspeed offers high-speed fiber internet, digital voice and business services across 20 US states.

On January 4, a hacking group known as Crimson Collective posted to Telegram that it had a raft of personally identifiable information (PII) in its possession.

It posted a sample of the data a day later, before adding on January 6: “Hey Brightspeed, we disconnected a lot of your users’ home internet … they might be complaining you should check.”

Read more on threats to ISPs: APT Group StormBamboo Attacks ISP Customers Via DNS Poisoning

Those claims have so far not been confirmed and it’s unclear how the group managed to breach Brightspeed.

Among the PII the group purports to have in its possession are:

  • Account master records, including names, email and service/billing addresses, phone numbers, account status, network type, consent flags, billing system, service instance, network assignment and site IDs
  • Address latitude and longitude coordinates, service type and marketing profile codes
  • Payment history including payment IDs, dates, amounts, invoice numbers, card types and last four digits of card numbers
  • Payment methods, including default payment method IDs, gateways, masked credit card numbers, expiry dates, BINs, cardholder names and addresses, and status flags
  • Appointment/order records for billing accounts

Crimson Collective Strikes Again

This isn’t the first time the group has hit the headlines. In September, it claimed responsibility for an attack on Red Hat’s private GitLab repositories, which resulted in the theft of nearly 570GB of data across 28,000 internal projects.

This reportedly included around 800 Customer Engagement Reports (CERs) detailing customer networks and platforms. 

One of these corporate customers was Nissan Fukuoka Sales, it emerged last month.

Jacob Krell, senior director of secure AI solutions and cybersecurity at Suzu Labs, argued that security breaches impacting ISPs can have a major knock-on effect.

“Because ISPs serve millions of people and underpin critical communications, security failures carry societal and national security implications, not just technical ones. Disruption or abuse of these networks can affect public trust, service continuity and the broader information environment,” he said.

“Cybercrime itself has evolved into a mature business. Data theft and extortion groups operate with specialization, coordination and clear financial incentives. As a result, breaches are rarely isolated events. Stolen data is often reused, resold and exploited over time, extending the impact well beyond the initial incident.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleTransparent Tribe Launches New RAT Attacks Against Indian Government and Academia
Next Article Inside the Chip: Rethinking Cybersecurity from the Ground Up
Team-CWD
  • Website

Related Posts

News

Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia

January 8, 2026
News

China intensifies Cyber-Attacks on Taiwan

January 7, 2026
News

The ROI Problem in Attack Surface Management

January 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202521 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202521 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Don’t let “back to school” become “back to bullying”

September 11, 2025

How chatbots can help spread scams

October 14, 2025

When ‘hacking’ your game becomes a security risk

October 17, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.