Company Details
comcast
60,212
706,769
517
https://corporate.comcast.com/
819
COM_2880559
Completed

Comcast Company CyberSecurity Posture
https://corporate.comcast.com/Welcome to Comcast. From the connectivity and platforms we provide to the content and experiences we create, we bring people together, globally. Our people think the world of our work, and that’s why our work is the best in the world.
Company Details
comcast
60,212
706,769
517
https://corporate.comcast.com/
819
COM_2880559
Completed
Between 0 and 549

Comcast Global Score (TPRM)XXXX

Description: Xfinity by Comcast reports a data breach following a cyberattack that took use of the CitrixBleed vulnerability. By taking use of this vulnerability, threat actors were able to take over active authenticated connections and get around multifactor authentication and other stringent authentication regulations. The security company Mandiant saw threat actors taking control of sessions in which the threat actor used session data that had been taken prior to the patch being deployed. The business discovered that hashed passwords and usernames are among the different client data that is exposed.
Description: Comcast, a US company, suffered a data breach incident in September 2015. The breach compromised the personal details of about 75,000 of its customers. The company had offered $100 to the affected customers and $25 million to the state agencies as compensation.
Description: Comcast, a major telecommunications conglomerate, faced a regulatory penalty of **$1.5 million** imposed by the **Federal Communications Commission (FCC)** due to a **data breach** that exposed the personal information of **237,000 customers**. The incident stemmed from inadequate vendor oversight, leading to unauthorized access to sensitive customer data, including names, addresses, phone numbers, and potentially financial details. The FCC settlement requires Comcast to implement stricter **third-party risk management protocols**, enhance **data protection measures**, and conduct regular audits to prevent future breaches. While the financial penalty is significant, the reputational damage and erosion of customer trust pose long-term risks. The breach did not result in confirmed identity theft or fraudulent transactions tied directly to the exposed data, but the scale of affected individuals and regulatory scrutiny underscore the severity of the lapses in cybersecurity governance. The incident highlights the growing regulatory focus on **vendor-related security failures** in safeguarding consumer privacy.
Description: The Federal Communications Commission announced this week that Comcast will pay a $1.5 million civil penalty to resolve an investigation into a 2024 data breach at one of its former debt-collection vendors that exposed the personal information of approximately 237,000 current and former customers. According to the FCC’s enforcement bureau, the compromised data belonged to subscribers of Comcast’s Xfinity internet, television, and home-security services. The breach occurred at Financial Business and Consumer Solutions (FBCS), a third-party debt collector that Comcast had retained until 2022. Even though the business relationship ended two years earlier, FBCS continued to store Comcast customer records containing sensitive personal information. The incident came to light in early 2024 when FBCS notified affected individuals that cybercriminals had gained unauthorized access to its systems. The exposed information reportedly included names, addresses, dates of birth, partial or full Social Security numbers, account numbers, and details about services subscribers had purchased from Comcast. In some cases, driver’s license numbers and security questions used for account verification were also compromised. FCC investigators determined that Comcast failed to implement adequate oversight of its former vendor’s data-security practices after the relationship ended. Although Comcast had contractually required FBCS to maintain reasonable security measures and to delete customer data o
Description: Comcast Corporation faced a severe data breach in 2024 due to a cyberattack on its former vendor, **Financial Business and Consumer Solutions (FBCS)**, a debt collection agency. Unauthorized actors gained access to FBCS’s network, exfiltrating and encrypting sensitive personal data of **237,000 current and former Comcast customers**, including **names, addresses, Social Security numbers, dates of birth, and Comcast account identifiers**. The breach exposed victims to high risks of **identity theft and financial fraud**, compounded by FBCS’s bankruptcy filing shortly before disclosure.The **FCC imposed a $1.5 million fine** on Comcast, which, while not admitting liability, agreed to enhance **vendor oversight, privacy protections, and cybersecurity measures**. Affected customers received **12 months of free credit monitoring and identity theft protection**, alongside advisories to enable **two-factor authentication** and monitor financial accounts. The incident underscores critical vulnerabilities in third-party vendor security and the cascading risks of inadequate data protection protocols.
Description: Comcast Corporation (NASDAQ:CMCSA) faced a **$1.5 million fine** from the **Federal Communications Commission (FCC)** after its vendor, **Financial Business and Consumer Solutions (FBCS)**, exposed the **personal data of ~237,000 current and former customers** using Comcast’s internet, TV, and home security services. The breach occurred in **August 2024**, but FBCS filed for bankruptcy before disclosing it. The exposed data included customer information linked to Comcast’s services, though specifics (e.g., financial details, exact PII types) were not detailed.The FCC mandated a **new compliance plan** with stricter **vendor oversight and privacy safeguards**. While Comcast reported strong Q3 earnings ($31.2B revenue, beating estimates), the breach added regulatory pressure amid broader scrutiny, including political tensions with President Trump over NBC’s content. The stock declined **29.29% YTD** and dropped **3.25% on the day** of the announcement, reflecting investor concerns over reputational and compliance risks.
Description: Comcast experienced a significant **data breach in February 2024** caused by a **third-party vendor’s cybersecurity failures**, exposing the **personal information of nearly 275,000 customers**, including names, addresses, and account details. The breach stemmed from **inadequate security measures** by the vendor, leading to unauthorized access and severe privacy risks. The incident triggered an **FCC investigation**, resulting in a **$1.5 million fine** and **reputational damage**, as customers questioned Comcast’s ability to protect their data. The case highlights critical gaps in **vendor oversight** and underscores the financial, regulatory, and trust-related consequences of third-party security lapses. While Comcast settled the probe, the breach serves as a warning for organizations to enforce **stricter vendor audits, continuous monitoring, and clear contractual cybersecurity obligations** to prevent similar incidents.
Description: Comcast, a major entertainment and telecommunications conglomerate, faced regulatory and financial repercussions after a **third-party vendor data breach** exposed the personal information of approximately **237,000 customers**. The breach occurred at **Financial Business and Consumer Solutions (FBCS)**, a now-bankrupt debt-collection vendor that Comcast had engaged until 2022. The incident, disclosed in **August 2024**, involved customer data from Comcast’s internet, TV, and home security services. While Comcast’s own systems remained uncompromised, the FCC imposed a **$1.5 million fine** and mandated stricter vendor oversight under a new compliance plan. The breach raised concerns over **vendor risk management**, particularly as FBCS had already filed for bankruptcy before the exposure was revealed. Comcast denied liability but committed to enhancing cybersecurity policies to prevent future incidents. The financial and reputational fallout contributed to a **3% stock decline** on the day of the announcement, compounding a **38.75% year-over-year loss** in share value.
Description: A BlackMarket on the dark web was offering about 590,000 Comcast email addresses and passwords for sale. The seller presented a list of 112 accounts asking for $300 USD for 100,000 accounts, and the complete list of 590,000 accounts sells for $1,000 USD as evidence of the reliability of the Comcast data. Approximately 200,000 out of the 590,000 records that were being sold on the illicit market were still active, according to Comcast, which was in possession of the list and had been examining the exposed information. The systems of Comcast have not been penetrated, according to the company's security staff, and each subscriber who reports unusual behaviour on his account will be contacted individually to address the problem.
Description: A bug in Comcast's website used to activate Xfinity compromised sensitive information on the company's customers. The website, used by customers to set up their home internet and cable service, was used to trick into displaying the home address where the router is located, as well as the Wi-Fi name and password. Only a customer account ID and that customer's house or apartment number are needed, even though the web form asks for a full address. That information could be grabbed from a discarded bill or obtained from an email. The bug returns data even if the Xfinity Wi-Fi is already switched on. It's also possible to rename Wi-Fi network names and passwords, temporarily locking users out.
Description: Comcast Xfininty's login page had a bug that allowed anyone to gain access to the partial Social Security Numbers and partial home addresses of over 26.5 million customers. The company patched the bug quickly after being notified of its existence.
Description: Comcast was affected by a data breach at Financial Business and Consumer Solutions (FBCS), a third-party agency providing collection-related services. The breach exposed personal data of approximately 238,000 customers, including names, addresses, Social Security numbers, dates of birth, and Comcast account details. The incident was the result of unauthorized network access and a ransomware attack at FBCS between February 14 and 26, 2024. Comcast ceased working with FBCS in 2020, but due to data retention requirements, FBCS still held Comcast customer data from around 2021. While FBCS has not observed misuse of the compromised data, Comcast offered one year of credit monitoring and identity protection services to impacted individuals.
Description: The FCC's Enforcement Bureau said Comcast has agreed to pay $1.5 million to resolve a vendor data breach that exposed personal data from more than 237,000 current and former customers. In an order (PDF) published last week, Comcast's "voluntary contribution" of $1.5 million is being combined with a compliance plan that includes, among other things, "certain Vendor oversight practices related to customer privacy and information protection." Tied in, Comcast will take steps to "enhance an existing data inventory program" designed to accurately track personally identifiable subscriber information that is shared with vendors. Comcast told Reuters that it "was not responsible for and has not conceded any wrongdoing in connection with this incident." As Light Reading reported in October 2024, Comcast had notified 237,703 customers that data, including home addresses and social security numbers, was stolen through a ransomware attack on a third-party debt collection agency – Financial Business and Consumer Solutions (FBCS) – that is no longer used by Comcast. CF Medical/Capio and Truist Bank were also impacted by the cybersecurity attack on FBCS. Former vendor alerted Comcast of data breach in 2024 FBCS had originally notified Comcast in March 2024 that it had been the target of a data breach, but that Comcast consumer data was not impacted. Then, in July 2024, FBCS followed up to inform Comcast that a new finding had discovered some Comcast data was impacted. An FBCS investiga
Description: The Medusa ransomware group claimed responsibility for a cyberattack on **Comcast Corporation**, a global media and technology conglomerate. The group allegedly exfiltrated **834.4 GB of data**, including actuarial reports, insurance modeling scripts, claim analytics, and customer data processing files (e.g., *Esur_rerating_verification.xlsx*, *Claim Data Specifications.xlsm*, Python/SQL scripts). They demanded **$1.2 million** to either delete the data or prevent its sale/leak, publishing **167,121 file entries** and **20 screenshots** as proof. The breach risks exposing sensitive financial, customer, and operational data, potentially triggering regulatory scrutiny. Comcast has not confirmed the attack, but Medusa’s history (e.g., a **$4M ransom demand on NASCAR** in 2025, later confirmed as a breach) suggests credibility. The leaked data’s scale—spanning insurance, premium analysis, and claims—implies severe operational and reputational damage. Previous incidents (e.g., **200,000 Comcast credentials leaked in 2015**) highlight vulnerabilities in legacy data protection. If validated, the breach could disrupt Comcast’s subsidiaries (NBCUniversal, Sky, Peacock) and erode trust in its cybersecurity posture.
Description: The **Medusa ransomware group** breached **Comcast Corporation**, a global media and technology company, in late September 2025, exfiltrating **834 GB of data**. The group leaked **186.36 GB of compressed data** (expanding to ~834 GB) on October 19, 2025, after Comcast refused to pay a **$1.2 million ransom**. The leaked files included sensitive records such as **Esur_rerating_verification.xlsx**, **Claim Data Specifications.xlsm**, and proprietary **Python/SQL scripts** related to auto premium analysis. The data was split into **47 files (45 x 4 GB + 1 x 2 GB)** and made available for purchase on the dark web.Comcast did not respond to inquiries, leaving the breach unconfirmed but highly credible given Medusa’s track record—including a prior **$4M ransomware attack on NASCAR** in April 2025. The group exploited the **GoAnywhere MFT vulnerability (CVE-2025-10035, CVSS 10.0)** for initial access. This incident follows Comcast’s **2023 Xfinity breach**, where a **Citrix vulnerability** exposed **35.9 million user accounts**. The leaked data’s scale and sensitivity suggest severe operational, financial, and reputational risks for Comcast, with potential regulatory and customer trust repercussions.
Description: The Vermont Office of the Attorney General disclosed that Xfinity suffered a data breach stemming from a **vulnerability in Citrix’s software**, enabling unauthorized access between **October 16–19, 2023**. The exposed data included **usernames, hashed passwords, full names, contact details, the last four digits of Social Security numbers, dates of birth, and secret questions/answers**. While the breach did not involve full Social Security numbers or financial data, the compromised credentials and personal identifiers pose significant risks, including **identity theft, phishing attacks, and account takeovers**. The incident was publicly reported on **December 18, 2023**, highlighting delays in detection and disclosure. The breach’s scope suggests potential long-term reputational damage and regulatory scrutiny, particularly given the sensitivity of the leaked information and the scale of Xfinity’s customer base.


Comcast has 29.87% more incidents than the average of same-industry companies with at least one recorded incident.
Comcast has 29.87% more incidents than the average of all companies with at least one recorded incident.
Comcast reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.
Comcast cyber incidents detection timeline including parent company and subsidiaries

Welcome to Comcast. From the connectivity and platforms we provide to the content and experiences we create, we bring people together, globally. Our people think the world of our work, and that’s why our work is the best in the world.


The future of mobile isn’t on the horizon, it’s happening now. At Ericsson, we’re building the foundation for an open network ecosystem where industries, developers, and enterprises thrive. The convergence of 5G, AI, cloud, and network APIs isn’t just a technological shift; it’s a transformation th
Welkom bij de LinkedIn pagina van KPN. Sinds jaar en dag maakt KPN technologie toegankelijk. Hier leest u alles over de ontwikkelingen rondom de thema’s die KPN belangrijk vindt, zoals Het Nieuwe Leven & Werken, Veiligheid & Privacy en ICT-infrastructuur. Ook een transparante en betrouwbare dienstve

vivo is a technology company that creates great products based on a design-driven value, with smart devices and intelligent services as its core. The company aims to build a bridge between humans and the digital world. Through unique creativity, vivo provides users with an increasingly convenient mo

We advance how people connect with each other and the world #ConnectionIsEverything. Bell is Canada's largest communications company providing advanced Bell broadband wireless, Internet, TV, media and business communications services. Founded in Montréal in 1880, Bell is wholly owned by BCE Inc. T

Mobile TeleSystems OJSC ("MTS") is the leading telecommunications group in Russia, Eastern Europe and Central Asia, offering mobile and fixed voice, broadband, pay TV as well as content and entertainment services in one of the world's fastest growing regions. Including its subsidiaries, as of Decemb

Rogers is Canada’s communications and entertainment company, driven to connect and entertain Canadians. For more information, please visit rogers.com or investors.rogers.com. Déterminée à connecter et à divertir les Canadiens et Canadiennes, Rogers est la référence canadienne en matière de commu

Mega es una empresa cien por ciento mexicana y líder en el sector de Telecomunicaciones, tenemos 45 años de servicio y casi 5 millones de suscriptores a quienes les ofrecemos los servicios de TV, internet, telefonía digital y móvil. Estamos en constante crecimiento, hoy en día tenemos presenci

EMPOWERING SOCIETIES. CONNECTING YOU TO WHAT MATTERS MOST. Telenor Group is a leading telecommunications company across the Nordics and Asia with 158 million subscribers and annual sales of around NOK 99 billions (2022). We are committed to responsible business conduct and driven by the ambition

Indosat Ooredoo Hutchison (IDX: ISAT) ("IOH"), are here with our vision to become the most preferred digital telecommunications company of Indonesia. The IOH merger combines two highly complementary businesses between PT Indosat Tbk (“Indosat Ooredoo”) and PT Hutchison 3 Indonesia to create a new wo
.png)
Comcast will pay $1.5 million and implement new vendor oversight practices to resolve a data breach stemming from an attack on a third-party...
A data breach at a former Comcast vendor that affected more than 270000 customers has resulted in a $1.5 million penalty for the company.
Comcast has agreed to pay a $1.5 million fine to settle a Federal Communications Commission (FCC) investigation into a data breach linked to...
The company agreed to pay fine to settle an FCC investigation into a data breach that exposed personal information .
The breach originated with Financial Business and Consumer Solutions (FBCS), a debt collection agency previously contracted by Comcast.
Comcast has agreed to a $1.5 million settlement with the Federal Communications Commission (FCC) following a data breach.
Comcast settlement with US FCC sees it pay $1.5m fine after breach of debt collection firm leaked thousands of customers' personal data.
The U.S. Federal Communications Commission (FCC) announced on Monday (November 24) that Comcast will pay a $1.5 million fine for a data...
The FCC has fined Comcast $1.5 million after a breach at its former vendor, FBCS, exposed personal data from 237000 customers.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Comcast is https://corporate.comcast.com/.
According to Rankiteo, Comcast’s AI-generated cybersecurity score is 353, reflecting their Critical security posture.
According to Rankiteo, Comcast currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Comcast is not certified under SOC 2 Type 1.
According to Rankiteo, Comcast does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Comcast is not listed as GDPR compliant.
According to Rankiteo, Comcast does not currently maintain PCI DSS compliance.
According to Rankiteo, Comcast is not compliant with HIPAA regulations.
According to Rankiteo,Comcast is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Comcast operates primarily in the Telecommunications industry.
Comcast employs approximately 60,212 people worldwide.
Comcast presently has no subsidiaries across any sectors.
Comcast’s official LinkedIn profile has approximately 706,769 followers.
Comcast is classified under the NAICS code 517, which corresponds to Telecommunications.
Yes, Comcast has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/comcast.
Yes, Comcast maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/comcast.
As of December 11, 2025, Rankiteo reports that Comcast has experienced 16 cybersecurity incidents.
Comcast has an estimated 9,686 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability, Data Leak, Ransomware and Breach.
Total Financial Loss: The total financial loss from these incidents is estimated to be $34 million.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with patched the bug quickly, and remediation measures with contacting subscribers reporting unusual behavior, and third party assistance with mandiant, and communication strategy with comcast offered one year of credit monitoring and identity protection services to impacted individuals, and communication strategy with public disclosure via vermont office of the attorney general, and communication strategy with no public response or acknowledgement, and remediation measures with improved vendor oversight (as per fcc mandate), and remediation measures with compliance plan with strengthened vendor oversight and customer-privacy safeguards, and remediation measures with new compliance plan with stricter vendor oversight rules, and communication strategy with public statement denying blame but committing to improved cybersecurity policies, and enhanced monitoring with improved cybersecurity policies (vendor monitoring), and and remediation measures with enhanced vendor oversight, remediation measures with stricter customer privacy protections, remediation measures with improved information security practices, and recovery measures with customer notifications, recovery measures with free identity theft protection (12-month credit monitoring), and communication strategy with public disclosure via fcc, communication strategy with customer notifications, communication strategy with advisories for two-factor authentication, and communication strategy with notification to affected individuals by fbcs, and and remediation measures with enhanced data inventory program, remediation measures with vendor oversight practices for customer privacy, and communication strategy with customer notifications (237,703 affected), communication strategy with public disclosure via fcc order..
Title: Comcast Data Breach
Description: Comcast, a US company, suffered a data breach incident in September 2015. The breach compromised the personal details of about 75,000 of its customers. The company had offered $100 to the affected customers and $25 million to the state agencies as compensation.
Date Detected: September 2015
Type: Data Breach
Title: Comcast Xfinity Website Bug Exposes Customer Information
Description: A bug in Comcast's website used to activate Xfinity compromised sensitive information on the company's customers. The website, used by customers to set up their home internet and cable service, was used to trick into displaying the home address where the router is located, as well as the Wi-Fi name and password. Only a customer account ID and that customer's house or apartment number are needed, even though the web form asks for a full address. That information could be grabbed from a discarded bill or obtained from an email. The bug returns data even if the Xfinity Wi-Fi is already switched on. It's also possible to rename Wi-Fi network names and passwords, temporarily locking users out.
Type: Data Breach
Attack Vector: Web Application Vulnerability
Vulnerability Exploited: Information Disclosure
Title: Comcast Xfinity Login Page Bug
Description: Comcast Xfinity's login page had a bug that allowed anyone to gain access to the partial Social Security Numbers and partial home addresses of over 26.5 million customers. The company patched the bug quickly after being notified of its existence.
Type: Data Breach
Attack Vector: Bug Exploitation
Vulnerability Exploited: Login Page Bug
Title: Comcast Email Credentials for Sale on Dark Web
Description: A BlackMarket on the dark web was offering about 590,000 Comcast email addresses and passwords for sale. The seller presented a list of 112 accounts asking for $300 USD for 100,000 accounts, and the complete list of 590,000 accounts sells for $1,000 USD as evidence of the reliability of the Comcast data. Approximately 200,000 out of the 590,000 records that were being sold on the illicit market were still active, according to Comcast, which was in possession of the list and had been examining the exposed information. The systems of Comcast have not been penetrated, according to the company's security staff, and each subscriber who reports unusual behaviour on his account will be contacted individually to address the problem.
Type: Data Breach
Attack Vector: Dark Web Marketplace
Threat Actor: Unknown
Motivation: Financial Gain
Title: Xfinity by Comcast Data Breach
Description: Xfinity by Comcast reports a data breach following a cyberattack that took use of the CitrixBleed vulnerability. By taking use of this vulnerability, threat actors were able to take over active authenticated connections and get around multifactor authentication and other stringent authentication regulations. The security company Mandiant saw threat actors taking control of sessions in which the threat actor used session data that had been taken prior to the patch being deployed. The business discovered that hashed passwords and usernames are among the different client data that is exposed.
Type: Data Breach
Attack Vector: CitrixBleed vulnerability
Vulnerability Exploited: CitrixBleed
Title: Comcast Data Breach via Third-Party Vendor
Description: Comcast was affected by a data breach at Financial Business and Consumer Solutions (FBCS), a third-party agency providing collection-related services. The breach exposed personal data of approximately 238,000 customers, including names, addresses, Social Security numbers, dates of birth, and Comcast account details. The incident was the result of unauthorized network access and a ransomware attack at FBCS between February 14 and 26, 2024. Comcast ceased working with FBCS in 2020, but due to data retention requirements, FBCS still held Comcast customer data from around 2021. While FBCS has not observed misuse of the compromised data, Comcast offered one year of credit monitoring and identity protection services to impacted individuals.
Date Detected: 2024-02-26
Type: Data Breach
Attack Vector: Unauthorized Network Access, Ransomware
Title: Xfinity Data Breach via Citrix Software Vulnerability
Description: The Vermont Office of the Attorney General reported that Xfinity experienced a data breach due to a vulnerability in Citrix's software, with unauthorized access occurring between October 16 and October 19, 2023. The breach potentially involved usernames, hashed passwords, names, contact information, last four digits of Social Security numbers, dates of birth, and secret questions and answers.
Date Publicly Disclosed: 2023-12-18
Type: Data Breach
Attack Vector: Exploitation of Citrix Software Vulnerability
Vulnerability Exploited: Citrix Software Vulnerability (unspecified)
Title: Medusa Ransomware Attack on Comcast Corporation
Description: The Medusa ransomware group claimed responsibility for a ransomware attack on Comcast Corporation, a global media and technology company. The group exfiltrated 834.4 GB of data, including actuarial reports, product management data, insurance modeling scripts, and claim analytics. They demanded $1.2 million for the data to be deleted or not leaked/sold. The group posted screenshots and a file listing of 167,121 entries as proof of compromise. Comcast has not publicly confirmed or denied the breach as of the report date.
Date Publicly Disclosed: 2025-09-26
Type: ransomware
Threat Actor: Medusa Ransomware Group
Motivation: financial gainextortion
Title: Medusa Ransomware Attack on Comcast Corporation
Description: The Medusa ransomware group leaked 186.36 GB of compressed data (834 GB decompressed) allegedly stolen from Comcast Corporation in late September 2025. The group initially demanded $1.2 million from Comcast to delete the data instead of leaking or selling it. The leaked data includes files such as 'Esur_rerating_verification.xlsx', 'Claim Data Specifications.xlsm', and Python/SQL scripts related to auto premium impact analysis. The data was released in 47 split files (45 files at 4 GB each and 1 file at 2 GB) on October 19, 2025. Comcast did not respond to requests for comment.
Date Detected: 2025-09-late
Date Publicly Disclosed: 2025-09-26
Type: data breach
Attack Vector: exploitation of GoAnywhere MFT vulnerability (CVE-2025-10035)unauthenticated remote code execution
Vulnerability Exploited: CVE-2025-10035 (GoAnywhere MFT, CVSS 10.0)
Threat Actor: Medusa ransomware group
Motivation: financial gainextortion
Title: Comcast Data Breach and FCC Settlement
Description: Comcast faces a $1.5 million fine for a data breach affecting 237,000 customers. The FCC settlement mandates improved vendor oversight to protect customer privacy.
Type: Data Breach
Title: Comcast Data Breach via Vendor FBCS Leading to $1.5M FCC Fine
Description: Comcast Corporation was fined $1.5 million by the FCC after its vendor, Financial Business and Consumer Solutions (FBCS), exposed the personal data of ~237,000 current and former customers (internet, TV, and home security services). FBCS went bankrupt before disclosing the August 2024 breach. Comcast agreed to a compliance plan with enhanced vendor oversight and privacy safeguards.
Type: Data Breach (Third-Party Vendor)
Title: Comcast Vendor Data Breach Exposes 237,000 Customers' Personal Information
Description: Entertainment giant Comcast (CMCSA) faced regulatory action after a third-party debt-collection vendor, Financial Business and Consumer Solutions (FBCS), suffered a data breach in 2024. The breach exposed personal information of approximately 237,000 Comcast customers, including those using internet, TV, and home security services. The FCC imposed a $1.5 million fine on Comcast, citing inadequate oversight of the vendor, which had filed for bankruptcy before the breach was publicly disclosed in August 2024. Comcast denied blame but agreed to a compliance plan with stricter vendor monitoring rules.
Date Publicly Disclosed: 2024-08
Type: data breach
Title: Comcast Data Breach via Former Vendor FBCS Exposes 237,000 Customer Records
Description: In a significant regulatory enforcement, Comcast Corporation agreed to pay a $1.5 million fine after a data breach at its former vendor, Financial Business and Consumer Solutions (FBCS), exposed sensitive personal information of approximately 237,000 current and former customers. The breach occurred in February 2024 and involved unauthorized access, exfiltration, and encryption of customer data, including names, addresses, Social Security numbers, dates of birth, and Comcast account identifiers. The FCC investigation led to a settlement requiring Comcast to implement enhanced vendor oversight, stricter privacy protections, and improved security practices. Comcast notified affected individuals and offered free identity theft protection services, including 12 months of credit monitoring.
Date Detected: 2024-02
Type: data breach
Attack Vector: unauthorized access to vendor (FBCS) network
Title: Comcast Third-Party Vendor Data Breach (2024)
Description: Comcast experienced a significant data breach in February 2024 due to inadequate cybersecurity measures by a third-party vendor handling customer data. The breach exposed personal information of nearly 275,000 Comcast customers, including names, addresses, and account-related details. The FCC imposed a $1.5 million fine on Comcast for the incident, highlighting the financial and reputational risks of third-party vendor vulnerabilities.
Date Detected: 2024-02
Type: Data Breach (Third-Party Vendor)
Attack Vector: Inadequate cybersecurity measures by third-party vendor
Vulnerability Exploited: Vendor's security shortcomings (unspecified)
Title: Comcast Data Breach via Former Debt-Collection Vendor (2024)
Description: The Federal Communications Commission (FCC) announced that Comcast will pay a $1.5 million civil penalty to resolve an investigation into a 2024 data breach at its former debt-collection vendor, Financial Business and Consumer Solutions (FBCS). The breach exposed the personal information of approximately 237,000 current and former Comcast customers, including subscribers of Xfinity internet, television, and home-security services. The compromised data included names, addresses, dates of birth, partial or full Social Security numbers, account numbers, service details, driver’s license numbers (in some cases), and security questions used for account verification. The FCC determined that Comcast failed to implement adequate oversight of FBCS’s data-security practices after terminating the business relationship in 2022.
Date Publicly Disclosed: 2024-05-00
Type: data breach
Vulnerability Exploited: inadequate vendor oversightimproper data retention by third-party vendor
Threat Actor: cybercriminals
Motivation: financial gaindata theft
Title: Comcast Vendor Data Breach Exposing 237,000+ Customer Records
Description: The FCC's Enforcement Bureau announced that Comcast agreed to pay $1.5 million to resolve a vendor data breach that exposed personal data (including home addresses and Social Security numbers) of over 237,000 current and former customers. The breach occurred via a ransomware attack on Financial Business and Consumer Solutions (FBCS), a third-party debt collection agency formerly used by Comcast. CF Medical/Capio and Truist Bank were also impacted by the same attack on FBCS. Comcast denied responsibility but implemented a compliance plan with enhanced vendor oversight and data inventory practices.
Date Detected: 2024-03-00
Date Publicly Disclosed: 2024-10-00
Type: Data Breach
Attack Vector: Third-Party Vendor (FBCS) Compromise
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Citrix Software Vulnerability, exploitation of GoAnywhere MFT vulnerability (CVE-2025-10035) and FBCS computer network.

Data Compromised: Home address, Wi-fi name, Wi-fi password
Systems Affected: Xfinity Website

Data Compromised: Partial social security numbers, Partial home addresses
Systems Affected: Login Page

Data Compromised: Email addresses and passwords
Identity Theft Risk: High

Data Compromised: Hashed passwords, Usernames

Data Compromised: Personal data of approximately 238,000 customers, including names, addresses, Social Security numbers, dates of birth, and Comcast account details
Identity Theft Risk: High

Data Compromised: Usernames, Hashed passwords, Names, Contact information, Last four digits of social security numbers, Dates of birth, Secret questions and answers
Identity Theft Risk: High (PII exposed)

Data Compromised: Actuarial reports, Product management data, Insurance modeling scripts, Claim analytics, Customer data processing, Claim management systems
Brand Reputation Impact: potential high impact (unconfirmed)
Legal Liabilities: potential regulatory scrutiny (unconfirmed)
Identity Theft Risk: potential (if customer data included)

Data Compromised: 834 gb (decompressed), Files including esur_rerating_verification.xlsx, claim data specifications.xlsm, python/sql scripts
Brand Reputation Impact: high (public leak of sensitive corporate data)

Financial Loss: $1.5 million (fine)
Data Compromised: Customer data (237,000 records)
Brand Reputation Impact: Potential negative impact due to breach and fine
Legal Liabilities: $1.5 million FCC fine

Financial Loss: $1.5 million (FCC fine)
Data Compromised: Personal data of ~237,000 customers
Brand Reputation Impact: Negative (amid regulatory scrutiny and political pressure)
Legal Liabilities: $1.5M FCC fine; compliance plan mandated
Identity Theft Risk: High (personal data exposed)

Data Compromised: personal information of ~237,000 customers
Brand Reputation Impact: stock price drop (>3% on Monday, 38.75% loss over past year)
Legal Liabilities: $1.5 million FCC fine
Identity Theft Risk: high (personal information exposed)

Financial Loss: $1.5 million (FCC fine)
Data Compromised: Names, Addresses, Social security numbers, Dates of birth, Comcast account identifiers
Systems Affected: FBCS computer network
Brand Reputation Impact: moderate (regulatory enforcement, public disclosure)
Legal Liabilities: $1.5 million FCC fine
Identity Theft Risk: high (exposed PII)

Financial Loss: $1.5 million (FCC fine)
Data Compromised: Names, Addresses, Account-related details
Customer Complaints: Increased (reputational damage)
Brand Reputation Impact: Negative (customers questioned data protection capabilities)
Legal Liabilities: $1.5 million FCC fine
Identity Theft Risk: High (sensitive personal data exposed)

Financial Loss: $1.5 million (FCC civil penalty)
Data Compromised: Names, Addresses, Dates of birth, Partial/full social security numbers, Account numbers, Service purchase details, Driver’s license numbers (in some cases), Security questions for account verification
Systems Affected: FBCS (Financial Business and Consumer Solutions) systems
Brand Reputation Impact: potential reputational damage due to exposure of sensitive customer data
Legal Liabilities: FCC investigation$1.5 million civil penalty
Identity Theft Risk: high (due to exposure of SSNs, driver’s license numbers, and security questions)

Financial Loss: $1.5 million (settlement)
Data Compromised: Home addresses, Social security numbers
Brand Reputation Impact: Potential reputational harm due to exposure of sensitive customer data
Legal Liabilities: $1.5 million FCC settlement
Identity Theft Risk: High (SSNs and addresses exposed)
Average Financial Loss: The average financial loss per incident is $2.12 million.
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal details, Home Address, Wi-Fi Name, Wi-Fi Password, , Partial Social Security Numbers, Partial Home Addresses, , Email addresses and passwords, Hashed Passwords, Usernames, , Personal data, Personally Identifiable Information (Pii), Authentication Credentials, , Actuarial Data, Financial Datasets, Insurance Calculations, Customer Data, Claim Management Data, , Corporate Documents, Excel Spreadsheets (E.G., Esur Rerating Verification.Xlsx, Claim Data Specifications.Xlsm), Python Scripts, Sql Scripts, Auto Premium Impact Analysis Data, , Customer privacy data, Personal data (customers of internet, TV, home security services), personal information, Personally Identifiable Information (Pii), Account Identifiers, , Personally Identifiable Information (Pii), , Personally Identifiable Information (Pii), Financial Data, Account Verification Data, , Personally Identifiable Information (Pii), Home Addresses, Social Security Numbers and .

Entity Name: Comcast
Entity Type: Company
Industry: Telecommunications
Location: United States
Customers Affected: 75,000

Entity Name: Comcast
Entity Type: Company
Industry: Telecommunications

Entity Name: Comcast Xfinity
Entity Type: Telecommunications
Industry: Telecommunications
Customers Affected: 26.5 million

Entity Name: Comcast
Entity Type: Company
Industry: Telecommunications
Customers Affected: 590000

Entity Name: Xfinity by Comcast
Entity Type: Telecommunications
Industry: Telecommunications

Entity Name: Comcast
Entity Type: Company
Industry: Telecommunications
Customers Affected: 238,000

Entity Name: Xfinity (Comcast)
Entity Type: Corporation
Industry: Telecommunications / Internet Service Provider
Location: United States

Entity Name: Comcast Corporation
Entity Type: public company, conglomerate
Industry: media, technology, telecommunications, entertainment
Location: United States (global operations)
Size: large (Fortune 50 company)

Entity Name: Comcast Corporation
Entity Type: public company
Industry: media, technology, telecommunications
Location: Philadelphia, Pennsylvania, U.S.
Size: large (Fortune 500)

Entity Name: Comcast
Entity Type: Corporation
Industry: Telecommunications / Media
Location: United States
Size: Large (Fortune 500)
Customers Affected: 237,000

Entity Name: Comcast Corporation
Entity Type: Public Company (NASDAQ:CMCSA)
Industry: Telecommunications/Media
Location: United States
Size: Large (Revenue: $31.2B in Q3 2024)
Customers Affected: 237,000

Entity Name: Financial Business and Consumer Solutions (FBCS)
Entity Type: Vendor (Bankrupt)
Industry: Financial Services/Data Processing

Entity Name: Comcast (CMCSA)
Entity Type: public company
Industry: telecommunications, entertainment, internet service provider
Location: United States
Size: large (Fortune 50)
Customers Affected: 237,000

Entity Name: Financial Business and Consumer Solutions (FBCS)
Entity Type: third-party vendor
Industry: debt collection

Entity Name: Comcast Corporation
Entity Type: corporation
Industry: telecommunications
Location: United States
Size: large
Customers Affected: 237,000

Entity Name: Financial Business and Consumer Solutions (FBCS)
Entity Type: vendor (debt collection agency)
Industry: financial services

Entity Name: Comcast
Entity Type: Telecommunications
Industry: Telecommunications
Location: United States
Size: Large (Fortune 500)
Customers Affected: 275,000

Entity Name: Comcast (Xfinity)
Entity Type: telecommunications and media conglomerate
Industry: telecommunications, internet service, cable television, home security
Location: United States
Size: large (Fortune 50 company)
Customers Affected: 237,000

Entity Name: Financial Business and Consumer Solutions (FBCS)
Entity Type: third-party debt collection vendor
Industry: financial services (debt collection)

Entity Name: Comcast
Entity Type: Telecommunications/ISP
Industry: Media & Communications
Location: United States
Size: Large (Fortune 50)
Customers Affected: 237,703

Entity Name: Financial Business and Consumer Solutions (FBCS)
Entity Type: Third-Party Vendor (Debt Collection)
Industry: Financial Services

Entity Name: CF Medical/Capio
Entity Type: Affected Entity (via FBCS)
Industry: Healthcare

Entity Name: Truist Bank
Entity Type: Affected Entity (via FBCS)
Industry: Banking

Containment Measures: patched the bug quickly

Remediation Measures: Contacting subscribers reporting unusual behavior

Third Party Assistance: Mandiant.

Communication Strategy: Comcast offered one year of credit monitoring and identity protection services to impacted individuals

Communication Strategy: Public disclosure via Vermont Office of the Attorney General

Communication Strategy: no public response or acknowledgement

Remediation Measures: Improved vendor oversight (as per FCC mandate)

Remediation Measures: Compliance plan with strengthened vendor oversight and customer-privacy safeguards

Remediation Measures: new compliance plan with stricter vendor oversight rules
Communication Strategy: public statement denying blame but committing to improved cybersecurity policies
Enhanced Monitoring: improved cybersecurity policies (vendor monitoring)

Incident Response Plan Activated: True
Remediation Measures: enhanced vendor oversightstricter customer privacy protectionsimproved information security practices
Recovery Measures: customer notificationsfree identity theft protection (12-month credit monitoring)
Communication Strategy: public disclosure via FCCcustomer notificationsadvisories for two-factor authentication

Communication Strategy: notification to affected individuals by FBCS

Incident Response Plan Activated: True
Remediation Measures: Enhanced data inventory programVendor oversight practices for customer privacy
Communication Strategy: Customer notifications (237,703 affected)Public disclosure via FCC order
Third-Party Assistance: The company involves third-party assistance in incident response through Mandiant, .

Type of Data Compromised: Personal details
Number of Records Exposed: 75,000

Type of Data Compromised: Home address, Wi-fi name, Wi-fi password
Sensitivity of Data: High
Personally Identifiable Information: Home Address

Type of Data Compromised: Partial social security numbers, Partial home addresses
Number of Records Exposed: 26.5 million

Type of Data Compromised: Email addresses and passwords
Number of Records Exposed: 590000
Sensitivity of Data: High
Personally Identifiable Information: Email addresses

Type of Data Compromised: Hashed passwords, Usernames

Type of Data Compromised: Personal data
Number of Records Exposed: 238,000
Sensitivity of Data: High
Personally Identifiable Information: Names, addresses, Social Security numbers, dates of birth, and Comcast account details

Type of Data Compromised: Personally identifiable information (pii), Authentication credentials
Sensitivity of Data: High
Data Exfiltration: Likely (unauthorized access confirmed)
Data Encryption: Partially (hashed passwords)

Type of Data Compromised: Actuarial data, Financial datasets, Insurance calculations, Customer data, Claim management data
Sensitivity of Data: high (potentially includes PII or proprietary business data)
Data Exfiltration: 834.4 GB
File Types Exposed: XLSX (e.g., Esur_rerating_verification.xlsx)XLSM (e.g., Claim Data Specifications.xlsm)Python scriptsSQL scripts
Personally Identifiable Information: potential (unconfirmed)

Type of Data Compromised: Corporate documents, Excel spreadsheets (e.g., esur_rerating_verification.xlsx, claim data specifications.xlsm), Python scripts, Sql scripts, Auto premium impact analysis data
Sensitivity of Data: high (internal corporate and operational data)
Data Exfiltration: 834 GB (decompressed from 186.36 GB compressed)
File Types Exposed: .xlsx.xlsm.py.sql

Type of Data Compromised: Customer privacy data
Number of Records Exposed: 237,000

Type of Data Compromised: Personal data (customers of internet, TV, home security services)
Number of Records Exposed: 237,000
Sensitivity of Data: High (personally identifiable information)
Data Exfiltration: Yes
Personally Identifiable Information: Yes

Type of Data Compromised: personal information
Number of Records Exposed: 237,000
Sensitivity of Data: high (personal information)

Type of Data Compromised: Personally identifiable information (pii), Account identifiers
Number of Records Exposed: 237,000
Sensitivity of Data: high (SSNs, dates of birth, account details)
Data Encryption: True

Type of Data Compromised: Personally identifiable information (pii)
Number of Records Exposed: 275,000
Sensitivity of Data: High (names, addresses, account details)
Data Exfiltration: Yes
Personally Identifiable Information: Yes

Type of Data Compromised: Personally identifiable information (pii), Financial data, Account verification data
Number of Records Exposed: 237,000
Sensitivity of Data: high (includes SSNs, driver’s license numbers, security questions)

Type of Data Compromised: Personally identifiable information (pii), Home addresses, Social security numbers
Number of Records Exposed: 237,703
Sensitivity of Data: High (SSNs included)
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Contacting subscribers reporting unusual behavior, Improved vendor oversight (as per FCC mandate), Compliance plan with strengthened vendor oversight and customer-privacy safeguards, new compliance plan with stricter vendor oversight rules, enhanced vendor oversight, stricter customer privacy protections, improved information security practices, , Enhanced data inventory program, Vendor oversight practices for customer privacy, .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by patched the bug quickly and .

Ransom Demanded: $1.2 million (for data deletion or to prevent leak/sale)
Ransomware Strain: Medusa
Data Exfiltration: 834.4 GB

Ransom Demanded: $1.2 million (for data deletion)
Ransomware Strain: Medusa
Data Exfiltration: 834 GB

Data Exfiltration: True

Data Exfiltration: True
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through customer notifications, free identity theft protection (12-month credit monitoring), .

Regulatory Notifications: Reported to Vermont Office of the Attorney General

Regulatory Notifications: potential (if sensitive data confirmed)

Regulations Violated: FCC customer privacy rules
Fines Imposed: $1.5 million
Legal Actions: FCC settlement

Regulations Violated: FCC consumer privacy rules
Fines Imposed: $1.5 million
Legal Actions: Settlement with FCC; mandated compliance plan
Regulatory Notifications: FCC disclosure

Fines Imposed: $1.5 million (FCC)
Legal Actions: settlement with FCC including compliance plan
Regulatory Notifications: FCC disclosure (August 2024)

Regulations Violated: FCC regulations (customer privacy),
Fines Imposed: $1.5 million
Legal Actions: FCC settlement agreement,
Regulatory Notifications: FCC investigation and disclosure

Regulations Violated: FCC data protection requirements,
Fines Imposed: $1.5 million
Legal Actions: FCC investigation and settlement
Regulatory Notifications: FCC

Regulations Violated: FCC data security and vendor oversight requirements,
Fines Imposed: $1.5 million
Legal Actions: FCC enforcement action,
Regulatory Notifications: FCC investigation and public disclosure

Fines Imposed: $1.5 million (FCC settlement)
Legal Actions: FCC Enforcement Bureau order, Compliance plan with vendor oversight requirements,
Regulatory Notifications: FCCAffected customers (237,703)
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through FCC settlement, Settlement with FCC; mandated compliance plan, settlement with FCC including compliance plan, FCC settlement agreement, , FCC investigation and settlement, FCC enforcement action, , FCC Enforcement Bureau order, Compliance plan with vendor oversight requirements, .

Lessons Learned: Importance of rigorous third-party vendor oversight and cybersecurity compliance for customer data protection.

Lessons Learned: Importance of vetting third-party vendors for cybersecurity risks, Need for robust data security protocols in vendor contracts, Proactive customer support (e.g., credit monitoring) mitigates reputational damage

Lessons Learned: Protecting customer data requires constant vigilance and assessment of vendor security measures., Organizations must enforce stricter controls and audits of third-party vendors., Transparency and swift action in response to breaches are crucial for maintaining customer trust.

Lessons Learned: Importance of post-contractual vendor oversight, Need for explicit data deletion clauses with third-party vendors, Risks of retaining customer data beyond necessary periods

Lessons Learned: Importance of third-party vendor risk management and real-time data inventory tracking for PII shared with external partners.

Recommendations: Enhance third-party vendor oversight and compliance monitoring to prevent future breaches.

Recommendations: Enhance vendor risk assessment protocols, Implement continuous monitoring of third-party security practices, Strengthen contractual obligations for data protection with vendors, Develop incident response plans specifically for third-party breachesEnhance vendor risk assessment protocols, Implement continuous monitoring of third-party security practices, Strengthen contractual obligations for data protection with vendors, Develop incident response plans specifically for third-party breachesEnhance vendor risk assessment protocols, Implement continuous monitoring of third-party security practices, Strengthen contractual obligations for data protection with vendors, Develop incident response plans specifically for third-party breachesEnhance vendor risk assessment protocols, Implement continuous monitoring of third-party security practices, Strengthen contractual obligations for data protection with vendors, Develop incident response plans specifically for third-party breaches

Recommendations: Implement stricter vendor cybersecurity audits, Enhance encryption and access controls for sensitive customer data, Expand customer education on two-factor authentication and fraud monitoringImplement stricter vendor cybersecurity audits, Enhance encryption and access controls for sensitive customer data, Expand customer education on two-factor authentication and fraud monitoringImplement stricter vendor cybersecurity audits, Enhance encryption and access controls for sensitive customer data, Expand customer education on two-factor authentication and fraud monitoring

Recommendations: Continuous monitoring of vendor security practices., Mandate periodic security audits for vendors with detailed reporting requirements., Define cybersecurity obligations and breach repercussions in vendor contracts.Continuous monitoring of vendor security practices., Mandate periodic security audits for vendors with detailed reporting requirements., Define cybersecurity obligations and breach repercussions in vendor contracts.Continuous monitoring of vendor security practices., Mandate periodic security audits for vendors with detailed reporting requirements., Define cybersecurity obligations and breach repercussions in vendor contracts.

Recommendations: Implement stricter vendor data-security audits, even after contract termination., Enforce contractual obligations for timely deletion of customer data by third parties., Enhance monitoring of third-party vendors handling sensitive customer information., Provide identity theft protection services to affected customers.Implement stricter vendor data-security audits, even after contract termination., Enforce contractual obligations for timely deletion of customer data by third parties., Enhance monitoring of third-party vendors handling sensitive customer information., Provide identity theft protection services to affected customers.Implement stricter vendor data-security audits, even after contract termination., Enforce contractual obligations for timely deletion of customer data by third parties., Enhance monitoring of third-party vendors handling sensitive customer information., Provide identity theft protection services to affected customers.Implement stricter vendor data-security audits, even after contract termination., Enforce contractual obligations for timely deletion of customer data by third parties., Enhance monitoring of third-party vendors handling sensitive customer information., Provide identity theft protection services to affected customers.

Recommendations: Implement stricter vendor cybersecurity audits, Enhance real-time monitoring of PII shared with third parties, Develop incident response protocols for vendor-originated breachesImplement stricter vendor cybersecurity audits, Enhance real-time monitoring of PII shared with third parties, Develop incident response protocols for vendor-originated breachesImplement stricter vendor cybersecurity audits, Enhance real-time monitoring of PII shared with third parties, Develop incident response protocols for vendor-originated breaches
Key Lessons Learned: The key lessons learned from past incidents are Importance of rigorous third-party vendor oversight and cybersecurity compliance for customer data protection.Importance of vetting third-party vendors for cybersecurity risks,Need for robust data security protocols in vendor contracts,Proactive customer support (e.g., credit monitoring) mitigates reputational damageProtecting customer data requires constant vigilance and assessment of vendor security measures.,Organizations must enforce stricter controls and audits of third-party vendors.,Transparency and swift action in response to breaches are crucial for maintaining customer trust.Importance of post-contractual vendor oversight,Need for explicit data deletion clauses with third-party vendors,Risks of retaining customer data beyond necessary periodsImportance of third-party vendor risk management and real-time data inventory tracking for PII shared with external partners.
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Develop incident response plans specifically for third-party breaches, Implement continuous monitoring of third-party security practices, Strengthen contractual obligations for data protection with vendors, Enhance vendor risk assessment protocols and Enhance third-party vendor oversight and compliance monitoring to prevent future breaches..

Source: Vermont Office of the Attorney General
Date Accessed: 2023-12-18

Source: Medusa Ransomware Group Dark Web Leak Site
Date Accessed: 2025-09-26

Source: Microsoft Security Advisory (CVE-2025-10035)
Date Accessed: 2025-10-early

Source: Benzinga

Source: FCC Settlement Announcement

Source: Federal Communications Commission (FCC)

Source: TipRanks / Market Analysis

Source: Federal Communications Commission (FCC)

Source: FCC investigation report (2024)

Source: Federal Communications Commission (FCC)

Source: FCC Enforcement Bureau Order (PDF)
Date Accessed: 2024-10-00
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Vermont Office of the Attorney GeneralDate Accessed: 2023-12-18, and Source: Hackread.comDate Accessed: 2025-09-26, and Source: Medusa Ransomware Group Dark Web Leak SiteDate Accessed: 2025-09-26, and Source: Hackread.comDate Accessed: 2025-10-19, and Source: Microsoft Security Advisory (CVE-2025-10035)Date Accessed: 2025-10-early, and Source: Benzinga, and Source: FCC Settlement Announcement, and Source: Federal Communications Commission (FCC), and Source: TipRanks / Market Analysis, and Source: Federal Communications Commission (FCC), and Source: FCC investigation report (2024), and Source: Federal Communications Commission (FCC), and Source: FCC Enforcement Bureau Order (PDF)Date Accessed: 2024-10-00, and Source: ReutersDate Accessed: 2024-10-00, and Source: Light ReadingDate Accessed: 2024-10-00.

Investigation Status: Disclosed (ongoing details unspecified)

Investigation Status: unconfirmed by Comcast; under monitoring by media (Hackread.com)

Investigation Status: ongoing (no official confirmation or denial from Comcast)

Investigation Status: Resolved (settlement reached)

Investigation Status: resolved (FCC settlement reached)

Investigation Status: resolved (FCC settlement reached)

Investigation Status: Resolved (FCC settlement reached)

Investigation Status: resolved (FCC settlement reached)

Investigation Status: Resolved (FCC settlement reached)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Comcast offered one year of credit monitoring and identity protection services to impacted individuals, Public disclosure via Vermont Office of the Attorney General, no public response or acknowledgement, public statement denying blame but committing to improved cybersecurity policies, Public Disclosure Via Fcc, Customer Notifications, Advisories For Two-Factor Authentication, Notification To Affected Individuals By Fbcs, Customer Notifications (237,703 Affected) and Public Disclosure Via Fcc Order.

Stakeholder Advisories: Fcc Public Disclosure, Customer Notifications With Identity Theft Protection Offers.
Customer Advisories: Monitor financial accounts for fraudulent activityEnable two-factor authentication on Comcast accountsUtilize provided 12-month credit monitoring service

Customer Advisories: FBCS notified affected individuals of the breach

Customer Advisories: 237,703 customers notified of data exposure
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Fcc Public Disclosure, Customer Notifications With Identity Theft Protection Offers, Monitor Financial Accounts For Fraudulent Activity, Enable Two-Factor Authentication On Comcast Accounts, Utilize Provided 12-Month Credit Monitoring Service, , Fbcs Notified Affected Individuals Of The Breach, , 237 and703 customers notified of data exposure.

Entry Point: Citrix Software Vulnerability

High Value Targets: Actuarial/Financial Datasets, Insurance Modeling Systems,
Data Sold on Dark Web: Actuarial/Financial Datasets, Insurance Modeling Systems,

Entry Point: exploitation of GoAnywhere MFT vulnerability (CVE-2025-10035)
High Value Targets: Corporate Data, Operational Scripts,
Data Sold on Dark Web: Corporate Data, Operational Scripts,

Entry Point: FBCS computer network
High Value Targets: Customer Pii, Comcast Account Identifiers,
Data Sold on Dark Web: Customer Pii, Comcast Account Identifiers,

High Value Targets: Comcast Customer Pii,
Data Sold on Dark Web: Comcast Customer Pii,

High Value Targets: Comcast Customer Pii, Cf Medical/Capio Data, Truist Bank Data,
Data Sold on Dark Web: Comcast Customer Pii, Cf Medical/Capio Data, Truist Bank Data,

Root Causes: Exploitation of unpatched Citrix software vulnerability

Root Causes: Unpatched Vulnerability (Cve-2025-10035), Lack Of Timely Response To Exploit Warnings,

Root Causes: Likely related to third-party vendor vulnerabilities (as implied by FCC mandate for improved oversight)
Corrective Actions: Implementation of stricter vendor oversight protocols as per FCC requirements

Root Causes: Vendor (FBCS) security failure; lack of oversight
Corrective Actions: Enhanced vendor oversight and customer-privacy safeguards per FCC compliance plan

Root Causes: Inadequate Oversight Of Third-Party Vendor (Fbcs), Vendor'S Bankruptcy Potentially Compromising Data Security Practices, Failure To Enforce Or Verify Compliance With Comcast'S Security Standards By The Vendor,
Corrective Actions: Implementation Of Stricter Vendor Compliance Plan, Enhanced Cybersecurity Policies For Third-Party Risk Management,

Root Causes: Inadequate Vendor Cybersecurity Oversight By Comcast, Fbcs Network Vulnerabilities Leading To Unauthorized Access, Lack Of Proactive Monitoring For Exfiltration Attempts,
Corrective Actions: Implementation Of Compliance Program With Enhanced Vendor Oversight, Stricter Customer Privacy Protections, Improved Information Security Practices Across Operations,

Root Causes: Inadequate Cybersecurity Measures By Third-Party Vendor, Lack Of Robust Vendor Oversight By Comcast,
Corrective Actions: Enhanced Vendor Accountability Measures, Stricter Security Protocols For Third-Party Data Handling,

Root Causes: Comcast’S Failure To Oversee Fbcs’S Data-Security Practices Post-Contract Termination, Fbcs’S Retention Of Comcast Customer Data Beyond The End Of The Business Relationship, Inadequate Security Measures At Fbcs Leading To Unauthorized Access,
Corrective Actions: $1.5 Million Civil Penalty Paid To Fcc, Likely Internal Policy Reviews For Third-Party Vendor Management,

Root Causes: Inadequate Third-Party Vendor Security Controls, Delayed Breach Notification By Fbcs (March To July 2024),
Corrective Actions: $1.5M Fcc Settlement, Enhanced Vendor Oversight, Improved Data Inventory Tracking,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Mandiant, , improved cybersecurity policies (vendor monitoring).
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Implementation of stricter vendor oversight protocols as per FCC requirements, Enhanced vendor oversight and customer-privacy safeguards per FCC compliance plan, Implementation Of Stricter Vendor Compliance Plan, Enhanced Cybersecurity Policies For Third-Party Risk Management, , Implementation Of Compliance Program With Enhanced Vendor Oversight, Stricter Customer Privacy Protections, Improved Information Security Practices Across Operations, , Enhanced Vendor Accountability Measures, Stricter Security Protocols For Third-Party Data Handling, , $1.5 Million Civil Penalty Paid To Fcc, Likely Internal Policy Reviews For Third-Party Vendor Management, , $1.5M Fcc Settlement, Enhanced Vendor Oversight, Improved Data Inventory Tracking, .
Last Ransom Demanded: The amount of the last ransom demanded was $1.2 million (for data deletion or to prevent leak/sale).
Last Attacking Group: The attacking group in the last incident were an Unknown, Medusa Ransomware Group, Medusa ransomware group and cybercriminals.
Most Recent Incident Detected: The most recent incident detected was on September 2015.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-10-00.
Highest Financial Loss: The highest financial loss from an incident was 25 million.
Most Significant Data Compromised: The most significant data compromised in an incident were Personal details, Home Address, Wi-Fi Name, Wi-Fi Password, , partial Social Security Numbers, partial home addresses, , Email addresses and passwords, Hashed passwords, Usernames, , Personal data of approximately 238,000 customers, including names, addresses, Social Security numbers, dates of birth, and Comcast account details, usernames, hashed passwords, names, contact information, last four digits of Social Security numbers, dates of birth, secret questions and answers, , actuarial reports, product management data, insurance modeling scripts, claim analytics, customer data processing, claim management systems, , 834 GB (decompressed), files including Esur_rerating_verification.xlsx, Claim Data Specifications.xlsm, Python/SQL scripts, , Customer data (237,000 records), Personal data of ~237,000 customers, personal information of ~237,000 customers, names, addresses, Social Security numbers, dates of birth, Comcast account identifiers, , Names, Addresses, Account-related details, , names, addresses, dates of birth, partial/full Social Security numbers, account numbers, service purchase details, driver’s license numbers (in some cases), security questions for account verification, , Home addresses, Social Security numbers and .
Most Significant System Affected: The most significant system affected in an incident was Xfinity Website and Login Page and FBCS computer network and FBCS (Financial Business and Consumer Solutions) systems.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was mandiant, .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was patched the bug quickly.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Customer data (237,000 records), Social Security numbers, personal information of ~237,000 customers, Addresses, service purchase details, Names, Email addresses and passwords, driver’s license numbers (in some cases), secret questions and answers, Personal data of approximately 238,000 customers, including names, addresses, Social Security numbers, dates of birth, and Comcast account details, addresses, Wi-Fi Name, Hashed passwords, product management data, usernames, Wi-Fi Password, Home Address, customer data processing, Personal details, claim analytics, last four digits of Social Security numbers, account numbers, partial/full Social Security numbers, partial home addresses, actuarial reports, dates of birth, files including Esur_rerating_verification.xlsx, Claim Data Specifications.xlsm, Python/SQL scripts, Usernames, security questions for account verification, names, hashed passwords, partial Social Security Numbers, contact information, Comcast account identifiers, 834 GB (decompressed), insurance modeling scripts, Personal data of ~237,000 customers, claim management systems, Account-related details and Home addresses.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 28.5M.
Highest Fine Imposed: The highest fine imposed for a regulatory violation was $1.5 million, $1.5 million, $1.5 million (FCC), $1.5 million, $1.5 million, $1.5 million, $1.5 million (FCC settlement).
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was FCC settlement, Settlement with FCC; mandated compliance plan, settlement with FCC including compliance plan, FCC settlement agreement, , FCC investigation and settlement, FCC enforcement action, , FCC Enforcement Bureau order, Compliance plan with vendor oversight requirements, .
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Risks of retaining customer data beyond necessary periods, Importance of third-party vendor risk management and real-time data inventory tracking for PII shared with external partners.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Expand customer education on two-factor authentication and fraud monitoring, Provide identity theft protection services to affected customers., Develop incident response plans specifically for third-party breaches, Implement continuous monitoring of third-party security practices, Implement stricter vendor data-security audits, even after contract termination., Continuous monitoring of vendor security practices., Define cybersecurity obligations and breach repercussions in vendor contracts., Enforce contractual obligations for timely deletion of customer data by third parties., Implement stricter vendor cybersecurity audits, Strengthen contractual obligations for data protection with vendors, Enhance vendor risk assessment protocols, Mandate periodic security audits for vendors with detailed reporting requirements., Enhance monitoring of third-party vendors handling sensitive customer information., Enhance third-party vendor oversight and compliance monitoring to prevent future breaches., Develop incident response protocols for vendor-originated breaches, Enhance real-time monitoring of PII shared with third parties and Enhance encryption and access controls for sensitive customer data.
Most Recent Source: The most recent source of information about an incident are Medusa Ransomware Group Dark Web Leak Site, Benzinga, Hackread.com, TipRanks / Market Analysis, FCC Enforcement Bureau Order (PDF), Reuters, Federal Communications Commission (FCC), Microsoft Security Advisory (CVE-2025-10035), Vermont Office of the Attorney General, FCC investigation report (2024), FCC Settlement Announcement and Light Reading.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Disclosed (ongoing details unspecified).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was FCC public disclosure, customer notifications with identity theft protection offers, .
Most Recent Customer Advisory: The most recent customer advisory issued were an Monitor financial accounts for fraudulent activityEnable two-factor authentication on Comcast accountsUtilize provided 12-month credit monitoring service, FBCS notified affected individuals of the breach, 237 and703 customers notified of data exposure.
Most Recent Entry Point: The most recent entry point used by an initial access broker were an FBCS computer network, Citrix Software Vulnerability and exploitation of GoAnywhere MFT vulnerability (CVE-2025-10035).
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Exploitation of unpatched Citrix software vulnerability, unpatched vulnerability (CVE-2025-10035)lack of timely response to exploit warnings, Likely related to third-party vendor vulnerabilities (as implied by FCC mandate for improved oversight), Vendor (FBCS) security failure; lack of oversight, Inadequate oversight of third-party vendor (FBCS)Vendor's bankruptcy potentially compromising data security practicesFailure to enforce or verify compliance with Comcast's security standards by the vendor, Inadequate vendor cybersecurity oversight by ComcastFBCS network vulnerabilities leading to unauthorized accessLack of proactive monitoring for exfiltration attempts, Inadequate cybersecurity measures by third-party vendorLack of robust vendor oversight by Comcast, Comcast’s failure to oversee FBCS’s data-security practices post-contract terminationFBCS’s retention of Comcast customer data beyond the end of the business relationshipInadequate security measures at FBCS leading to unauthorized access, Inadequate third-party vendor security controlsDelayed breach notification by FBCS (March to July 2024).
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Implementation of stricter vendor oversight protocols as per FCC requirements, Enhanced vendor oversight and customer-privacy safeguards per FCC compliance plan, Implementation of stricter vendor compliance planEnhanced cybersecurity policies for third-party risk management, Implementation of compliance program with enhanced vendor oversightStricter customer privacy protectionsImproved information security practices across operations, Enhanced vendor accountability measuresStricter security protocols for third-party data handling, $1.5 million civil penalty paid to FCCLikely internal policy reviews for third-party vendor management, $1.5M FCC settlementEnhanced vendor oversightImproved data inventory tracking.
.png)
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions prior to 16.0.96 and 17.0.1 through 17.0.9 have a weak default password. By default, this is a 6 digit numeric value which can be brute forced. (This is the app_password parameter). Depending on local configuration, this password could be the extension, voicemail, user manager, DPMA or EPM phone admin password. This issue is fixed in versions 16.0.96 and 17.0.10.
Neuron is a PHP framework for creating and orchestrating AI Agents. In versions 2.8.11 and below, the MySQLWriteTool executes arbitrary SQL provided by the caller using PDO::prepare() + execute() without semantic restrictions. This is consistent with the name (“write tool”), but in an LLM/agent context it becomes a high-risk capability: prompt injection or indirect prompt manipulation can cause execution of destructive queries such as DROP TABLE, TRUNCATE, DELETE, ALTER, or privilege-related statements (subject to DB permissions). Deployments that expose an agent with MySQLWriteTool enabled to untrusted input and/or run the tool with a DB user that has broad privileges are impacted. This issue is fixed in version 2.8.12.
Neuron is a PHP framework for creating and orchestrating AI Agents. Versions 2.8.11 and below use MySQLSelectTool, which is vulnerable to Read-Only Bypass. MySQLSelectTool is intended to be a read-only SQL tool (e.g., for LLM agent querying, however, validation based on the first keyword (e.g., SELECT) and a forbidden-keyword list does not block file-writing constructs such as INTO OUTFILE / INTO DUMPFILE. As a result, an attacker who can influence the tool input (e.g., via prompt injection through a public agent endpoint) may write arbitrary files to the DB server if the MySQL/MariaDB account has the FILE privilege and server configuration permits writes to a useful location (e.g., a web-accessible directory). This issue is fixed in version 2.8.12.
Okta Java Management SDK facilitates interactions with the Okta management API. In versions 11.0.0 through 20.0.0, race conditions may arise from concurrent requests using the ApiClient class. This could cause a status code or response header from one request’s response to influence another request’s response. This issue is fixed in version 20.0.1.
The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. When using versions 4.11.0 through 4.11.2 and 4.12.0, simultaneous requests on the same client may result in improper lookups in the TokenRequestCache for the request results. This issue is fixed in versions 4.11.2 and 4.12.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.