[agents/model-providers] [xai-auth] bootstrap config fallback: no config-backed key found

title: "Intel Brief: Conduent Government Technology — Ransomware Attack State Services Breach" date: 2026-04-05 slug: conduent-government-technology-breach


Intel Brief: Conduent Government Technology — Ransomware Attack State Services Breach

Conduent, a major government technology company processing data for state agencies and government healthcare programs, publicly disclosed a confirmed ransomware attack that occurred in January 2025 and exposed personal information of tens of millions of Americans. The Safeway ransomware gang claimed responsibility for the attack and claimed to have stolen over 8 terabytes of sensitive data. Conduent's initial April disclosure significantly downplayed the breach scale, but subsequent notifications revealed far more extensive exposure than initially reported. Texas alone reported 15.4 million affected individuals (revised from initial 4 million estimate), Oregon reported 10.5 million affected, and hundreds of thousands more across additional states. The stolen data includes names, Social Security numbers, medical information, and health insurance details affecting millions of Americans dependent on state healthcare and government services. The breach represents a critical compromise of US government technology infrastructure and exposes tens of millions of citizens to identity theft, medical fraud, and long-term security risks.

What Happened

Conduent confirmed a ransomware attack that occurred in January 2025 and resulted in successful exfiltration of over 8 terabytes of sensitive government and healthcare data. The attack was claimed by the Safeway ransomware gang. Conduent's initial public disclosure in April 2026 significantly underestimated the breach scope, but subsequent investigations and state-level notifications revealed the true scale of exposure affecting tens of millions of Americans.

Confirmed Facts:

Attack Timeline:

  1. Initial Compromise (January 2025, specific date not disclosed): Safeway ransomware gang gained unauthorized access to Conduent systems.

  2. Network Reconnaissance & Data Identification (January 2025): Attackers identified and mapped state agency and healthcare program data stored within Conduent infrastructure.

  3. Large-Scale Data Exfiltration (January 2025): Over 8 terabytes of data was copied from Conduent systems to attacker-controlled infrastructure.

  4. Ransomware Deployment (January 2025): Ransomware was deployed across Conduent systems for encryption and extortion.

  5. Public Claim (January-April 2025): Safeway ransomware gang publicly claimed the attack.

  6. Initial Disclosure (April 2026): Conduent publicly disclosed the breach with significant scope underestimation.

  7. Scale Revelation (April 2026): Subsequent investigations revealed true extent of exposure (15.4M Texas, 10.5M Oregon, etc.).

  8. Ongoing Notifications (April 2026): State-by-state notifications to affected individuals continued.

What Was Taken

Confirmed Data Exposure:

Inferred Data Exposure (based on state healthcare processing):

Sensitivity Assessment: CRITICAL. Government healthcare and state agency data includes:

Scale: Tens of millions of Americans affected across multiple states

Strategic Impact: The exposure enables:

Why It Matters

This attack represents a critical compromise of US government technology infrastructure serving state agencies and healthcare programs affecting tens of millions of American citizens and demonstrates the massive risk from ransomware attacks targeting government contractors.

Strategic Significance:

  1. Government Infrastructure Compromise: Conduent processes data for state agencies and government healthcare programs across multiple states. The compromise affects fundamental government service delivery and citizen data security.

  2. Massive Scale Exposure: The exposure of 15.4 million individuals in Texas alone, plus 10.5 million in Oregon, plus additional hundreds of thousands across other states represents tens of millions of Americans affected by a single breach.

  3. Long-Term Identifier Exposure: Unlike credit card breaches where compromised cards can be replaced, Social Security numbers and health records are long-term identifiers that cannot be easily replaced, creating multi-year fraud risk.

  4. Medical Information Compromise: The exposure of medical diagnoses and treatment information creates specialized fraud risk (medical identity fraud) and potential privacy violations regarding health conditions.

  5. Hidden Attack Impact: Many affected individuals may not be aware Conduent processes their data, leading to delayed security responses and potentially extended attacker access window.

  6. Initial Disclosure Failure: Conduent's April disclosure significantly downplayed the breach scope, indicating inadequate initial impact assessment and potential regulatory violations regarding timely and accurate breach notification.

  7. Ransomware Operational Impact: The deployment of ransomware across government systems likely caused significant operational disruption to state agencies and healthcare programs beyond the data theft itself.

The Attack Technique

Specific attack methodology and initial access vector are not disclosed in available reporting.

Confirmed Facts:

Not Disclosed: The source material does not provide details on:

Attack chain indicates successful compromise of enterprise government contractor infrastructure.

What Organizations Should Do

For Conduent & Government Contractors:

  1. Immediate Incident Response & Forensic Investigation — Conduct complete forensic analysis of all systems compromised in January 2025 attack; determine initial access vector; identify all data exfiltrated; determine whether attackers maintain persistence in systems.

  2. Customer Notification & Remediation — Provide comprehensive notification to all affected state agencies and individuals; provide multi-year credit monitoring and identity theft protection for all affected citizens; establish dedicated support for fraud victims.

  3. Government Data Security Hardening — Implement segmentation between different state agency data; restrict access to sensitive healthcare and benefit information; deploy continuous monitoring for unauthorized data access; implement data loss prevention tools.

  4. Ransomware Recovery & System Restoration — Develop recovery strategy from clean backups; test recovery procedures; restore systems from known-clean backup points; ensure offline, immutable backups not accessible to attackers.

  5. Government Compliance & Regulatory Coordination — Coordinate incident response with state attorneys general; notify federal law enforcement (FBI, CISA); assess compliance with HIPAA (healthcare data), GLBA (financial data), and state privacy laws; implement mandatory incident disclosure timelines.

  6. Third-Party Government Contractor Security — Establish contractual security requirements for government data access; require SOC 2 Type II certification; mandate immediate incident notification; implement continuous security assessments; consider data minimization strategies.

For State Agencies & Government Programs:

For Affected Citizens (Tens of Millions):

Sources: Conduent Data Breach: Millions Affected Across Multiple States (2026)