
In November 2025, Conduent confirmed a data breach affecting the protected health records of approximately 25 million people. For 84 days, the SafePay ransomware group worked inside Conduent's network and exfiltrated 8.5 terabytes of data without triggering a single alarm.
SplitSecure protects enterprises from attacks like the Conduent security breach. Learn More.
The Conduent security breach, which ultimately resulted in the exposure of protected health records belonging to 25 million people (and at least $25 million in costs to Conduent), stemmed from Conduent's administrative accounts having unilateral authority to access, move, and exfiltrate data without independent constraint.
Just as in other breaches we’ve analysed, such as the Cloud Nordic breach two years earlier, there was a single point of failure in how Conduent managed privileged credentials.
Below, we show you exactly what went wrong during the Conduent security breach so you can avoid a similar situation in your organization.
Conduent is, for most Americans, a relatively unknown name. Yet it is an organization that millions of people interact with every year. Conduent processes over 500 million Medicaid claims annually and manages benefits for 120 million people across 46 states.
With such enormous responsibility, Conduent was ISO 27001 certified and invested heavily in security. However, the problem (which emerged after the 2025 breach) was that Conduent’s security investment was primarily focused on perimeter security, i.e., stopping attackers from entering Conduent’s network.
But like every security program, there were gaps. SafePay reportedly gained initial access through compromised VPN and RDP credentials.
From there:
Perimeter security can never be counted on to be 100% foolproof. Organizations are fixed targets and, with enough time and resources, an attacker will inevitably find an entry point into a network.
What separates relatively minor incidents from major breaches like Conduent’s is what happens next. What can an attacker do once they’re inside?
Unfortunately for Conduent (as well as their suppliers and the 25 million impacted individuals), their administrative systems had unilateral authority over production data.
This meant that once a trusted identity was compromised, its authority was unconstrained.
SafePay attackers were able to break in and easily mimic legitimate administrative activity using stolen credentials, effectively neutralizing the perimeter-focused security stack.
This was not Conduent's first incident either.
In June 2020, the Maze ransomware group compromised Conduent with an eight-week dwell time.
Four years later, SafePay extended that window to 12 weeks because the attack surface had not been architecturally addressed, and controls were primarily focused on keeping attackers out without considering how to prevent damage when/if someone got in.
In the table below, we break down the critical points where Conduent's security controls failed.
The root cause in 2020 was the same as the 2024 breach in that a single administrative domain gave anyone unilateral authority over production systems.
The 2020 incident should have been a signal to address the architectural vulnerability, but four years later, the same attack vector produced a larger and more impactful breach.
The business risks from relying on centralized credential management are enormous, but beyond this high-level lesson, there are three core takeaways for any organization processing sensitive data at scale:
With SplitSecure, Conduent attackers could not have executed the data exfiltration even after compromising internal systems. No single path leads to an account with unconstrained authority.
No single point of failure
Separation of duties enforced by architecture
Every request logged automatically
In 2024-2025, the SafePay ransomware group compromised Conduent Business Services, exfiltrating 8.5 terabytes of data, including protected health records for approximately 25 million people, over an 84-day period.
The attackers gained access through compromised VPN and RDP credentials, then scraped administrative credentials from memory. Because a single administrator had unilateral access to production data, the stolen identity gave the attackers unconstrained authority to exfiltrate data.
The attackers used legitimate administrative credentials and mimicked normal activity. In a system where a single trusted identity has unconstrained authority, there is no architectural distinction between legitimate and illegitimate access.
Yes. In 2020, the Maze ransomware group compromised Conduent with an eight-week dwell time. The root cause was the same: a single administrative domain with unilateral authority over production systems.
By splitting administrative credentials across multiple devices so that no single device persists the protected credentials. Reconstructing a secret requires a threshold of team members to collaborate, making unilateral access mathematically impossible.
See how SplitSecure's distributed secrets architecture prevents single-point-of-failure attacks on your most critical systems.
SplitSecure makes separation of duties a mathematical certainty, not a policy hope. Learn More.
Our Blog