What You Need to Know about the Ericsson Data Breach

  • Published: Mar 12, 2026
  • Last Updated: Mar 12, 2026

Ericsson Inc. is the U.S. subsidiary of Telefonaktiebolaget LM Ericsson, a Swedish multinational telecommunications company founded in 1876. Headquartered in Stockholm, the parent company is a global leader in mobile connectivity hardware, software, and services for telecommunications operators and enterprises. Ericsson specializes in 5G, 6G, Internet of Things, artificial intelligence, cloud computing, and serves public safety, utilities, manufacturing, government, and military sectors.

The company employs nearly 90,000 people worldwide. U.S. operations, headquartered in Plano, Texas, employ over 6,200 people across more than 30 locations.

In April 2025, an unnamed third-party service provider for Ericsson fell victim to a voice phishing (vishing) cyberattack, exposing personal information of 15,661 individuals. Attackers used social engineering to trick a single vendor employee into providing access credentials. Once inside, attackers accessed files containing sensitive personal information belonging to Ericsson employees and customers.

Compromised data may include names, addresses, Social Security numbers, driver's license numbers, government-issued ID numbers, financial information, including account and credit card numbers, medical information, and dates of birth. The vendor detected the breach on April 28, 2025, and notified the FBI. However, Ericsson was not informed until November 10, 2025, more than six months later.

The investigation was completed on February 23, 2026. Ericsson began mailing notification letters to all 15,661 affected individuals on March 9, 2026, and filed disclosures with state attorneys general. The company is offering 12 months of complimentary IDX identity protection services.

When Was the Ericsson Data Breach?

According to Ericsson's notifications, unauthorized individuals accessed files between April 17 and 22, 2025. The service provider detected suspicious activity on April 28, 2025, six days after the access window ended. The provider initiated an investigation with external cybersecurity specialists, notified the FBI, and implemented enhanced security measures.

The investigation revealed that attackers used vishing, voice phishing, by pretending to be legitimate callers. Vishing attacks typically involve criminals posing as IT staff or help desk personnel to trick employees into revealing access credentials. Security experts note that vishing attacks have exploded in popularity, and security teams are still learning how to prepare staff for this social engineering threat.

Ericsson was notified by the service provider on November 10, 2025, more than six months after the breach was discovered. From November 2025 through February 2026, Ericsson worked to determine whose information was exposed. The data review was completed on February 23, 2026, identifying 15,661 affected individuals. Notification letters were mailed on March 9, 2026, nearly eleven months after the initial breach.

How to Check If Your Data Was Breached

If you are a current or former Ericsson employee, contractor, or customer, your information may have been compromised. Here's how to verify:

  • Check your mail for notification letters from Ericsson sent starting March 9, 2026. Letters include breach details, specific data types compromised in your case, and instructions for enrolling in complimentary IDX identity protection services.
  • Contact Ericsson directly if you believe you may have been affected but have not received notification.
  • Review your credit reports for unfamiliar accounts or inquiries at AnnualCreditReport.com.
  • Monitor financial account statements for unauthorized transactions, even small charges.

The breach affected individuals across multiple states: 4,377 in Texas, 239 in Massachusetts, 21 in Maine, and additional individuals in California and other states.

Types of information potentially compromised include:

  • Full names and home addresses
  • Social Security numbers
  • Driver's license numbers
  • Government-issued ID numbers, including passport numbers and state ID cards
  • Financial information, including account numbers and credit or debit card numbers
  • Medical information and protected health information
  • Dates of birth

Ericsson noted that the service provider has no evidence of misuse of any potentially impacted information. However, this is a standard disclaimer and provides limited assurance.

What to Do If Your Data Was Breached

If you received a notification letter from Ericsson, take these steps immediately:

Ericsson offers complimentary IDX identity protection for 12 months. Enroll by June 9, 2026. Services include credit monitoring across all three bureaus, dark web monitoring, $1 million identity fraud reimbursement, and managed identity theft recovery. Your notification letter includes enrollment instructions.

  • Review Financial Accounts and Credit Reports

Check bank accounts and credit cards for unauthorized transactions. Look for unfamiliar charges, withdrawals, new accounts, or information changes. Report suspicious activity immediately. Order free credit reports from all three bureaus at AnnualCreditReport.com and review for unauthorized accounts or inquiries.

  • Consider Credit Freeze or Fraud Alert

A credit freeze prevents new creditors from accessing your credit report, blocking identity thieves from opening accounts in your name. Contact Equifax, Experian, and TransUnion. Alternatively, place a fraud alert requiring creditors to verify your identity before opening new accounts.

  • Monitor Medical Records and Watch for Phishing

Review medical records and explanation of benefits statements for unfamiliar procedures or prescriptions. File tax returns early and watch for IRS notices about duplicate filings. Be cautious of unexpected emails, calls, or texts claiming to be from Ericsson, financial institutions, or government agencies. Verify legitimacy by contacting organizations directly using independently found contact information.

Are There Any Lawsuits?

As of mid-March 2026, several law firms have announced they are investigating potential class action lawsuits on behalf of individuals affected by the Ericsson data breach:

  • ClassAction.org

ClassAction.org announced it is investigating a class action lawsuit on behalf of individuals whose information was exposed. The firm notes that victims may be entitled to compensation for damages, including the cost of credit monitoring services, time spent dealing with the breach, and increased risk of identity theft and fraud.

  • Class Action U

Class Action U is investigating potential legal claims, noting that Ericsson may have failed to implement adequate data security measures and took nearly eleven months to notify affected individuals, well beyond the notification deadlines required by many state laws.

  • Migliaccio & Rathod LLP

Migliaccio & Rathod LLP is investigating whether Ericsson violated consumer protection laws and failed to properly safeguard customer and employee information. The firm is offering free consultations to affected individuals.

  • Strauss Borrelli PLLC

Strauss Borrelli PLLC announced an investigation focusing on whether Ericsson failed to implement reasonable security measures to protect sensitive personal information and whether the company unreasonably delayed in notifying affected individuals.

  • Shamis & Gentile P.A.

Shamis & Gentile P.A. is investigating potential claims against Ericsson for negligence in failing to protect personal information and delays in notifying victims.

No formal lawsuits have been filed yet as of mid-March 2026. If you believe you were affected and are interested in learning more about potential legal claims, you can contact investigating law firms for free consultations. There is typically no cost to join class action investigations, and attorneys work on contingency, meaning they only get paid if they successfully recover compensation.

Can My Information Be Used for Identity Theft?

Yes. The combination of data types exposed in this breach creates significant risk for identity theft and fraud:

  • Social Security Numbers

SSNs are the key to opening credit accounts, applying for loans, filing fraudulent tax returns, and accessing government benefits. Combined with names and dates of birth, criminals have everything needed to impersonate victims and commit synthetic identity theft.

  • Driver's License Numbers and Government IDs

These can be used to create fake identification documents, open bank accounts, rent apartments, apply for jobs, or obtain services in your name. Criminals can use this information to bypass identity verification systems.

  • Financial Account Information

Account numbers and credit or debit card numbers can be used for unauthorized purchases, withdrawals, or transfers. Criminals may drain accounts, make large purchases, or sell the information to other criminals on the dark web.

  • Medical Information

Medical identity theft allows criminals to obtain medical services, prescription drugs, or medical equipment using your identity and insurance. This can corrupt your medical records with incorrect information about diagnoses, treatments, or prescriptions, potentially leading to dangerous medical errors. It can also result in insurance claim denials and collection notices for services you never received.

  • Combined Data Creates Maximum Risk

The most dangerous aspect of this breach is that it exposed multiple types of sensitive information for each victim. When criminals have your name, address, SSN, date of birth, and driver's license number together, they can convincingly impersonate you across numerous contexts. 

This comprehensive data package allows criminals to pass security checks that rely on knowledge-based authentication, answer security questions, and defeat identity verification systems.

What Can You Do to Protect Yourself Online?

Beyond the immediate steps you should take in response to this specific breach, here are long-term strategies to protect yourself online:

  • Use Strong, Unique Passwords

Create strong passwords (at least 12 characters with uppercase, lowercase, numbers, and symbols) for every account. Never reuse passwords. Use a password manager to generate and store complex passwords securely.

  • Enable Multi-Factor Authentication

Enable multi-factor authentication (MFA) on every account that offers it. MFA requires a second verification form beyond your password, making it much harder for attackers to access accounts even if they have your credentials.

  • Be Cautious of Vishing Attacks

This breach occurred through vishing, voice phishing. Be skeptical of unexpected phone calls asking for sensitive information, even if the caller claims to be from IT support, your bank, or a government agency. If someone calls requesting credentials or personal information, hang up and call the organization back using a number you find independently. Never provide passwords, account numbers, or SSNs over the phone unless you initiated the call.

  • Monitor Your Accounts Regularly

Check bank accounts, credit cards, and credit reports regularly for suspicious activity. Set up account alerts for large transactions, password changes, or new account openings. Review credit reports from all three bureaus at least annually through AnnualCreditReport.com.

  • Limit Information Sharing

Be mindful of what personal information you share online and with companies. The less information available about you, the less data criminals can exploit if a breach occurs. Review privacy settings on social media and limit what you share publicly.

  • Secure Your Devices

Keep software and operating systems updated with the latest security patches. Use antivirus software and enable firewalls. Avoid using public Wi-Fi for sensitive transactions, or use a VPN if you must access financial or personal accounts on public networks.

  • Understand Third-Party Risks

This breach didn't originate with Ericsson itself but with a third-party vendor. When providing information to any company, understand that your data may be shared with vendors, contractors, and service providers. Unfortunately, you have limited control over these third parties' security practices. This makes it even more important to take proactive steps, such as credit freezes and monitoring, to protect yourself, regardless of how carefully companies and their vendors handle your data.

Related Articles

What is Data Leak and How to Prevent Accidental Data Leakage

Data breaches take many forms, and one of them is through data leak and accidental web exposure. M ... Read More

The Saga of T-Mobile Data Breach: 2013, 2015, 2021 and 2023 Hacks

T-Mobile has experienced a number of data breaches in the past decade. The first case occurred som ... Read More

Anthem Data Breach Exposed 78 Million Records

In the Anthem Data Breach of 2015, hackers were able to steal 78.8 million member’s records. ... Read More

Everything You Need to Know About Insider Data Breach

Data breaches are on the news frequently, but the average person doesn’t really know that much a ... Read More

The NSA Hack, How Did it Happen?

The National Security Agency (NSA) was the main attraction in a major data breach involving three ... Read More

Latest Articles

What You Need to Know about the LexisNexis Data Breach

What You Need to Know about the LexisNexis Data Breach

LexisNexis Legal & Professional is a global provider of legal, regulatory, and business information used by lawyers, corporations, governments, and academic institutions.

What You Need to Know about the Ericsson Data Breach

What You Need to Know about the Ericsson Data Breach

Ericsson Inc. is the U.S. subsidiary of Telefonaktiebolaget LM Ericsson, a Swedish multinational telecommunications company founded in 1876.

What You Need to Know about the Bell Ambulance Data Breach

What You Need to Know about the Bell Ambulance Data Breach

Bell Ambulance, Inc. is the largest ambulance service provider in Wisconsin, headquartered in Milwaukee. Founded in 1977, the company operates a fleet of 86 ambulances from 11 stations and employs more than 750 medical professionals who respond to approximately 140,000 service calls annually throughout Milwaukee, Waukesha, and Racine counties in Southeastern Wisconsin.

What You Need to Know about the University of Hawaii Cancer Center Data Breach

What You Need to Know about the University of Hawaii Cancer Center Data Breach

The University of Hawaii Cancer Center is the only National Cancer Institute-designated cancer center in Hawaii. Located in Honolulu, the center employs over 300 faculty and staff conducting critical epidemiological research studying cancer risks across diverse populations.

What You Need to Know about the Vikor Scientific Data Breach

What You Need to Know about the Vikor Scientific Data Breach

Vikor Scientific is a molecular diagnostics company based in Charleston, South Carolina, that now operates under the brand name Vanta Diagnostics.

What You Need to Know about the CarGurus Data Breach

What You Need to Know about the CarGurus Data Breach

CarGurus is a major online automotive marketplace founded in 2006 and publicly traded on NASDAQ under the ticker symbol CARG.

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Notice

By proceeding with this scan, you agree to let IDStrong run a Free Scan of supplied parameters of your personal information and provide free preliminary findings in compliance with our Terms of Use and Privacy Notice. You consent to us using your provided information to complete the Free Scan and compare it against our records and breach databases or sources to provide your Free preliminary findings report.

Rest assured: IDStrong will not share your information with third parties or store your information beyond what is required to perform your scan and share your results.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close