Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Hackers Abuse OAuth Flow to Steal Microsoft Device Authorization
May 15, 2026
Microsoft Edge, Windows 11, LiteLLM H Hacked Pwn2Own
May 15, 2026
OrBit Rootkit Steals SSH & Sudo Credentials from Hackers Harvest
May 15, 2026
Home/CyberSecurity News/Crimson Collective Disconnected Brightspeed Home Internet Users
CyberSecurity News

Crimson Collective Disconnected Brightspeed Home Internet Users

An emerging extortion group,

David kimber
David kimber
January 7, 2026 2 Min Read
17 0

An emerging extortion group, Collective Disconnected Brightspeed-fiber-broadband/”>Crimson Collective Disconnected Brightspeed. The group asserts it stole data from over 1 million residential customers and Disconnected Brightspeed Home internet service.

The group posted screenshots on Telegram detailing the alleged compromise and urging Brightspeed employees to “read their mails fast.”​

On January 4, 2026, Crimson Collective announced possession of extensive customer datasets from Brightspeed, a major ISP serving rural and suburban areas across 20 states.

The post listed compromised records, including customer master files with full PII such as names, emails, phone numbers, billing/service addresses, account status, and network details like fiber/copper/4G types, bandwidth limits, and geolocation coordinates.

Additional data encompasses payment histories (IDs, amounts, masked card numbers with last four digits, expiry dates, BINs, holder info), appointment records with technician dispatch details, marketing profiles, and suspension reasons.​

The actors released data samples on January 5 as threatened, and claimed a “sophisticated attack” enabling user disconnections from ISP service, which was later clarified as home internet, not mobile.

They are offering the full dataset for three Bitcoin (about $276,370), with plans to leak it online within a week if unsold.​

Brightspeed’s Response

Brightspeed confirmed it is “investigating reports of a cybersecurity event” and takes network security seriously, promising updates to customers, staff, and authorities.

Spokesperson Gene Rodriguez Miller emphasized rigorous threat monitoring but declined to provide specifics on the claims. No evidence of service outages has been widely reported, though the group alleges proactive disruptions.​

Crimson Collective gained notoriety in 2025 for breaching Red Hat’s GitLab repositories, exfiltrating 570GB of data that later impacted 21,000 Nissan customers’ PII.

They collaborated with Scattered Lapsus$ Hunters (ShinyHunters-linked) for extortion and have targeted AWS environments via credential abuse. The group has not disclosed intrusion methods for Brightspeed but hinted at ignored pre-disclosure emails.​

Affected customers face risks of phishing, identity theft, and targeted attacks from exposed PII and partial payment data, though full cards or passwords were not claimed stolen.

Cybersecurity experts urge monitoring accounts and enabling MFA, as the incident highlights vulnerabilities in telecom infrastructure. Federal probes may follow, given Brightspeed’s critical role. As of January 7, no full breach confirmation exists, but samples appear authentic per the researcher’s cross-checks.​

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachCybersecurityPatchphishingSecurityThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

10 Best Vulnerability Assessment and Penetration Testing (VAPT)

Next Post

Forcepoint DLP Flaw Allows Memory Manipulation & Code Execution

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical cPanel Flaws Allow Access to Sensitive System
May 15, 2026
Amazon Redshift JDBC Driver Flaws Allow Remote Code Execution
May 15, 2026
PraisonAI Vulnerability Exploited Hours After Public Disclosure
May 15, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us