Breaking: Brightspeed Investigating Data Breach Claims Involving 1M+ Customers

If you use Brightspeed for home internet or you run a small office on it, this is one of those “pay attention today” stories.

Brightspeed told reporters it’s investigating reports of a cybersecurity event after the “Crimson Collective” extortion group claimed they stole sensitive information tied to more than 1 million Brightspeed customers.

What happened (so far)

Here’s what’s confirmed versus claimed as of Jan 5, 2026:

  • Confirmed: Brightspeed says it’s investigating a reported cybersecurity event and will keep customers, employees, and authorities informed.
  • Claimed by attackers: Crimson Collective alleges they exfiltrated customer data (and they’ve been pushing this via Telegram).
  • Claimed data types: Reports describe customer/account details including PII (personally identifiable info), addresses, names, emails, phone numbers, payment history, some payment card information, and appointment or order records.

Brightspeed is a newer ISP (founded in 2022) serving rural and suburban areas across 20 states, so this could have a wide blast radius if the claim holds up.

Why this matters to normal humans and small businesses

ISP breaches are annoying because the fallout often isn’t “hack your PC,” it’s hack your identity and accounts:

  • Phishing gets sharper: If attackers have your name, address, phone, and ISP details, scam emails and “support calls” get way more convincing.
  • Account takeovers: If your Brightspeed portal password is reused anywhere else, that’s the first domino.
  • Payment fraud risk: Even “some payment card info” plus billing history is enough to justify being extra paranoid.

What you should do today (10–15 minutes, practical stuff)

1) Change your Brightspeed account password

Make it unique (not a remix of your usual one). If you use a password manager, this is exactly what it’s for.

2) Assume “Brightspeed Support” calls and emails might be fake

If you get a call about your modem, billing, “account verification,” or “network upgrades,” treat it as suspicious. Hang up, then contact Brightspeed using the number on your bill or their official site.

3) Lock down your email account

Most account takeovers start with email. If you do only one “security upgrade” this week:

  • Turn on MFA (multi-factor authentication) for your email
  • Review recovery email/phone numbers
  • Kick out unknown signed-in sessions

4) Watch payment methods tied to your ISP bill

If you pay by card, keep an eye on charges. If your card issuer supports virtual card numbers, consider using them for utility-style recurring billing going forward.

5) Small business owners: brief your staff

A simple Slack message like: “No one gives credentials to ‘ISP support’ inbound. We call them back via official numbers.” saves real money.

What we’re watching next

The key next step is whether Brightspeed confirms:

  • What data was accessed
  • Whether payment data was exposed
  • Who needs notification, and how they’ll contact customers

Right now, the most accurate framing is: Brightspeed is investigating, and the attacker claim is unverified beyond what’s been publicly described.