Fiber ISP Brightspeed is investigating claims by the Crimson Collective extortion group that it stole data on more than one million residential customers. The group posted data samples to Telegram on January 4, 2026, and claims it has been inside Brightspeed’s production systems since late December 2025. A class-action lawsuit was filed on January 7, 2026.

Incident overview

AttributeDetails
VictimBrightspeed
Threat actorCrimson Collective
Claimed victims1+ million customers
Initial accessLate December 2025 (claimed)
Public disclosureJanuary 4, 2026
Asking price3 Bitcoin (~$285,000)
Class-action filedJanuary 7, 2026
Verification statusUnder investigation

What Crimson Collective claims to have

Data categorySpecific elements
Customer PIINames, emails, phone numbers
Address dataBilling and service addresses
Account informationStatus, network type, site IDs
Payment dataHistory, methods, last 4 digits of cards
Service recordsOrder records, appointments
Session dataUser IDs, session identifiers
Network detailsService instance, network assignment
Consent flagsMarketing and communication preferences

Timeline

DateEvent
Late December 2025Crimson Collective claims initial access
January 4, 2026Group posts to Telegram claiming breach
January 5, 2026First data samples published
January 6, 2026Group claims service disruption capability
January 7, 2026Class-action lawsuit filed
Mid-January 2026Data listed for sale at 3 BTC
OngoingBrightspeed investigation continues

Service disruption claims

On January 6, Crimson Collective posted: “Hey Brightspeed, we disconnected a lot of your users’ home internet … they might be complaining you should check.”

ClaimStatus
Customer disconnectionsUnverified—no public reports of outages
Production system accessUnder investigation
Data exfiltrationSamples published, authenticity unconfirmed
Ongoing accessClaimed but not verified

This allegation appears only in the group’s own messaging and has not been corroborated by any public reporting or customer complaints.

Brightspeed’s response

“We are currently investigating reports of a cybersecurity event. As we learn more, we will keep our customers, employees and authorities informed. We take the security of our networks and protection of our customers’ and employees’ information seriously and are rigorous in securing our networks and monitoring threats.” — Brightspeed spokesperson

Current status (mid-January 2026)

ItemStatus
Data exfiltration confirmedNo
Production system compromiseUnder investigation
Customer notificationsNot issued
Credit monitoring offeredNot announced
Law enforcement notificationPresumed (not confirmed)
Regulatory disclosureNot confirmed

Class-action lawsuit

AttributeDetails
Filing dateJanuary 7, 2026
AllegationsFailures in safeguarding customer data
JurisdictionUS federal court
StatusEarly stage
Regulatory confirmationNone yet

No U.S. regulator or law enforcement agency has publicly confirmed an investigation or enforcement action tied to the Brightspeed claims.

Who is Crimson Collective?

Crimson Collective is an extortion-focused group that emerged publicly in September 2025.

Group profile

AttributeDetails
First observedSeptember 2025
ModelData-theft extortion (no ransomware)
TargetsCloud-hosted enterprise environments
LeveragePublic data leak threats
PartnershipsScattered Lapsus$ Hunters collective
Leak infrastructureUses ShinyHunters leak site
CommunicationTelegram

Known operations

DateTargetImpact
October 2025Red Hat GitLab570 GB data, ~28,000 repositories
December 2025Nissan (via Red Hat)21,000 customers affected
January 2026Brightspeed1M+ customer records (claimed)

Red Hat incident details

AttributeDetails
Target systemGitLab instance
Data volume~570 GB
Repositories affected~28,000
Primary impactRed Hat consulting division
DateOctober 2025
Downstream impactNissan disclosed 21,000 affected customers

The Nissan disclosure in late December 2025 confirmed that the Red Hat breach had cascading effects on Red Hat’s customers.

Tactics, techniques, and procedures

CharacteristicDescription
Initial accessCloud environment compromise
PersistenceExtended access before detection
Data theftLarge-scale exfiltration
Extortion modelPublish samples, demand payment
No ransomwarePure extortion, no encryption
Partnership leverageUses established leak sites

The group follows an increasingly common approach: steal data, post samples to prove access, and demand payment to prevent full publication. This model has grown as ransomware defenses improve and organizations maintain better backup capabilities.

Brightspeed background

AttributeDetails
Formation2022 (acquired Lumen consumer assets)
Service area20 states (Southeast and Central US)
ServicesResidential fiber and DSL
Customer baseMillions (largely rural and suburban)
Parent transactionLumen Technologies divestiture
InfrastructureFormer CenturyLink consumer network

Brightspeed acquired Lumen Technologies’ consumer fiber assets in 2022 and operates across 20 states, primarily serving rural and suburban markets in the southeastern and central United States.

Service footprint

RegionCoverage
Southeast USPrimary market
Central USSecondary market
Rural areasSignificant presence
Suburban areasGrowing fiber deployments

Extortion economics

ElementDetails
Asking price3 Bitcoin (~$285,000 at current rates)
DeadlineNot publicly specified
NegotiationPresumed via Telegram
Publication threatFull data release
Typical outcomeVariable—some pay, some don’t

Impact assessment

For affected customers

RiskConcern levelMitigation
Identity theftHigh (if SSNs included)Credit monitoring, fraud alerts
Financial fraudModerate (limited card data)Monitor statements
Phishing attacksHigh (detailed contact info)Verify all communications
Account takeoverModerate (service account data)Change passwords
SIM swappingModerate (phone numbers exposed)Carrier PIN protection

For Brightspeed

ImpactAssessment
Regulatory exposureState breach notification laws in 20+ states
Reputation damageTrust erosion in competitive market
Operational disruptionClaimed but unverified
Financial costsInvestigation, notification, monitoring, legal
Litigation exposureClass-action already filed
Customer churn riskDependent on breach confirmation

Recommendations for Brightspeed customers

Immediate actions

ActionRationale
Monitor financial accountsWatch for unauthorized charges
Place fraud alertsContact credit bureaus (Equifax, Experian, TransUnion)
Enable account alertsSet up notifications on all financial accounts
Document current stateScreenshot account balances and recent transactions
Change Brightspeed passwordPrecautionary measure
Enable 2FA where availableAdditional account protection

Ongoing vigilance

RiskProtection
Phishing attemptsBe skeptical of calls/emails claiming to be Brightspeed
Social engineeringVerify any requests for account information
Service changesLog in directly to verify any account modifications
Official communicationsWatch for legitimate breach notifications
Carrier securityEnable PIN/passcode with mobile carrier

Credit protection options

OptionBenefit
Fraud alertFree, lasts 1 year, requires verification
Credit freezeStronger protection, blocks new credit
Credit monitoringOngoing alerts for changes
Identity theft protectionComprehensive monitoring

Investigation context

As of mid-January 2026, Brightspeed had not confirmed:

QuestionStatus
Data exfiltration occurrenceUnconfirmed
Scope of compromised systemsUnder investigation
Service disruption claimsUnverified
Timeline for notificationsNot announced
Affected customer countUnknown

The company’s investigation is ongoing. Customers should monitor for official communications regarding the incident and any credit monitoring offers that may be extended.

Broader implications

The Brightspeed incident reflects the ongoing challenge telecommunications providers face from data extortion groups. ISPs hold particularly sensitive customer data:

Data typeSensitivity
Home addressesPhysical security concern
Service locationsPrivacy exposure
Payment informationFinancial risk
Account detailsSocial engineering enabler
Usage patternsBehavioral intelligence

Telecom sector targeting

FactorAttacker interest
Large customer basesHigh victim count
Sensitive dataMultiple data types
Essential servicePressure to resolve quickly
Regulatory exposureCompliance concerns add leverage
CompetitionReputation matters

Crimson Collective’s partnership with other criminal groups and use of established leak infrastructure demonstrates the increasingly collaborative nature of the cybercrime ecosystem. The group’s focus on cloud-hosted environments and data theft over ransomware deployment represents an evolution in threat actor tactics as defensive capabilities improve against encryption-based attacks.