What You Need to Know about the LexisNexis Data Breach

  • Published: Mar 13, 2026
  • Last Updated: Mar 13, 2026

LexisNexis Legal & Professional is a global provider of legal, regulatory, and business information used by lawyers, corporations, governments, and academic institutions. A division of RELX Group based in London, the company was founded in 1970 and is headquartered in Atlanta, Georgia. LexisNexis operates 40 offices worldwide with approximately 11,000 employees, serving customers in more than 180 countries. The company works with approximately 91 percent of Fortune 100 companies and 85 percent of Fortune 500 companies.

In late February 2026, the threat actor FulcrumSec breached LexisNexis's Amazon Web Services cloud infrastructure by exploiting an unpatched React2Shell vulnerability. The attackers exfiltrated approximately 2.04 gigabytes of data and publicly leaked stolen files on March 3, 2026. LexisNexis confirmed the breach on March 4, 2026.

The stolen data allegedly includes information on approximately 400,000 cloud user profiles with names, email addresses, phone numbers, and job functions. The breach exposed data connected to more than 21,000 enterprise customer accounts, including law firms, courts, regulatory agencies, and federal government offices. FulcrumSec claims 118 users had government email addresses, including federal judges, Department of Justice attorneys, and SEC staff.

The attackers also stole 53 plaintext secrets from AWS Secrets Manager containing database passwords and API keys for Salesforce, Oracle, and analytics platforms. LexisNexis states the compromised servers contained mostly legacy data from before 2020 and did not include Social Security numbers, driver's licenses, financial information, or active passwords.

When Was the LexisNexis Data Breach?

FulcrumSec gained access on February 24, 2026, by exploiting React2Shell (CVE-2025-55182), a critical vulnerability in an unpatched React application. This flaw allows unauthenticated remote code execution and carries a severity score of 10.0 out of 10.0. CISA added it to actively exploited vulnerabilities on December 5, 2025, urging patches within one week. LexisNexis failed to update for over two months.

Once inside, attackers discovered a single ECS task role with read access to every secret in the AWS account, including production database credentials. This poor configuration allowed lateral movement through LexisNexis's cloud environment. Between February 24 and early March, FulcrumSec exfiltrated 2.04 gigabytes of data.

On March 3, 2026, FulcrumSec posted a manifesto on BreachForums, publicly disclosing the breach with technical details and samples. LexisNexis confirmed the breach on March 4, 2026, stating it was contained with no evidence of product or service impact. The company notified law enforcement and engaged cybersecurity forensics experts.

This is separate from a December 2024 breach in which attackers compromised a third-party platform used by LexisNexis Risk Solutions, exposing the Social Security numbers and driver's licenses of 364,333 individuals.

How to Check If Your Data Was Breached

Unlike consumer breaches with notification letters about Social Security numbers, this breach exposed business and customer relationship data. LexisNexis informed customers but has not sent individual letters to the 400,000 users whose profiles were allegedly exposed.

If you use LexisNexis Legal & Professional:

  • Check email for security notifications from LexisNexis and review trust.lexisnexis.com for updates.
  • Government employees using LexisNexis: 118 .gov email users were affected, including federal judges, DOJ attorneys, and SEC staff.
  • Law firms and organizations: Information about 21,000+ enterprise accounts was exposed.

Compromised information included customer names, business contacts, user IDs, products used, customer surveys with IP addresses, and support tickets. FulcrumSec claims they also stole 400,000 user profiles with names, emails, phone numbers, and job functions, plus 53 plaintext AWS secrets and 45 employee password hashes.

LexisNexis states that no Social Security numbers, driver's licenses, credit cards, bank accounts, financial information, active passwords, or customer contracts were exposed.

What to Do If Your Data Was Breached

This breach exposed business contact information rather than Social Security numbers or financial accounts. LexisNexis has not offered credit monitoring. If affected, take these steps:

  • Change Passwords and Enable Multi-Factor Authentication

Change your LexisNexis password to a strong, unique one (12+ characters with mixed case, numbers, symbols). Enable multi-factor authentication if available.

  • Watch for Phishing and Social Engineering

The exposed names, emails, phone numbers, and job functions enable sophisticated phishing. Be cautious of emails or calls claiming to be from LexisNexis, IT support, or colleagues requesting credentials or urgent action. Verify independently before responding.

  • Government Employees and Organizations

Government workers should report the breach to their security team. Law firms and corporate legal departments should assess competitive risks from exposed subscription details, educate employees about phishing, and review vendor risk management processes.

  • Consider Identity Protection Services

Consider subscribing to a comprehensive identity theft protection service like IDStrong, which offers credit monitoring across all three bureaus, dark web surveillance, and social media monitoring.

Are There Any Lawsuits?

As of mid-March 2026, no class action lawsuits have been filed for this February-March 2026 breach. Markovits, Stock & DeMarco, LLC is investigating potential claims and offering free consultations to affected individuals.

Most online class action information relates to a different December 2024 breach affecting LexisNexis Risk Solutions (not Legal & Professional), where 364,333 individuals' Social Security numbers and driver's licenses were compromised. That earlier breach prompted investigations by ClassAction.org and other firms.

The current breach primarily exposed business contact information rather than Social Security numbers, making traditional class action litigation less likely. However, potential claims could focus on negligence in failing to patch React2Shell for two months after CISA warnings, poor security practices, including weak passwords, and exposure of government employee information.

Can My Information Be Used for Identity Theft?

Traditional identity theft risk is low since the breach did not expose Social Security numbers, driver's licenses, or financial accounts. However, the stolen information enables sophisticated phishing, social engineering, and business email compromise:

  • Targeted Phishing Attacks

Names, emails, phone numbers, and job functions enable highly personalized phishing campaigns. Attackers can impersonate colleagues, partners, or LexisNexis representatives with convincing details.

  • Business Email Compromise

Criminals could impersonate senior attorneys or clients to trick employees into wiring funds or sharing confidential information using details from the breach.

  • Credential and System Attacks

The 45 employee password hashes and 53 plaintext AWS secrets create risks if attackers crack weak passwords. FulcrumSec's claim that 'Lexis1234' was used across multiple systems suggests inadequate password security.

  • Government and Competitive Risks

Exposure of 118 government users, including federal judges and DOJ attorneys, creates national security concerns. The 21,000+ enterprise customer records showing subscription details and pricing could enable competitive intelligence and corporate espionage.

What Can You Do to Protect Yourself Online?

The LexisNexis breach highlights critical cloud security vulnerabilities. Here are the steps to protect yourself:

  • Strong Passwords and Multi-Factor Authentication

The alleged use of 'Lexis1234' as a password demonstrates that basics still matter. Use strong, unique passwords (12+ characters, mixed case, numbers, and symbols) for every account. Never reuse passwords. Use a password manager to generate and store complex passwords. Enable multi-factor authentication on all accounts, especially email, cloud storage, and professional services.

  • Keep Software Updated

LexisNexis failed to patch React2Shell for over two months after CISA warnings. Always install security updates promptly and enable automatic updates when possible. Many breaches exploit known vulnerabilities with available patches.

  • Be Vigilant About Phishing

Expect targeted phishing attempts. Be skeptical of unexpected emails that create urgency, ask for credentials, or reference specific work details. Verify senders independently before clicking links or providing information.

  • For Organizations: Review Cloud Security

Follow the principle of least privilege; grant only the minimum necessary permissions. Never give single service roles access to all secrets. Regularly audit cloud permissions, use secrets management properly with rotation policies, and monitor for unusual access patterns. Conduct vendor risk assessments and provide employee security awareness training covering phishing recognition and business email compromise prevention.

Related Articles

What is Data Leak and How to Prevent Accidental Data Leakage

Data breaches take many forms, and one of them is through data leak and accidental web exposure. M ... Read More

The Saga of T-Mobile Data Breach: 2013, 2015, 2021 and 2023 Hacks

T-Mobile has experienced a number of data breaches in the past decade. The first case occurred som ... Read More

Anthem Data Breach Exposed 78 Million Records

In the Anthem Data Breach of 2015, hackers were able to steal 78.8 million member’s records. ... Read More

Everything You Need to Know About Insider Data Breach

Data breaches are on the news frequently, but the average person doesn’t really know that much a ... Read More

The NSA Hack, How Did it Happen?

The National Security Agency (NSA) was the main attraction in a major data breach involving three ... Read More

Latest Articles

What You Need to Know about the LexisNexis Data Breach

What You Need to Know about the LexisNexis Data Breach

LexisNexis Legal & Professional is a global provider of legal, regulatory, and business information used by lawyers, corporations, governments, and academic institutions.

What You Need to Know about the Ericsson Data Breach

What You Need to Know about the Ericsson Data Breach

Ericsson Inc. is the U.S. subsidiary of Telefonaktiebolaget LM Ericsson, a Swedish multinational telecommunications company founded in 1876.

What You Need to Know about the Bell Ambulance Data Breach

What You Need to Know about the Bell Ambulance Data Breach

Bell Ambulance, Inc. is the largest ambulance service provider in Wisconsin, headquartered in Milwaukee. Founded in 1977, the company operates a fleet of 86 ambulances from 11 stations and employs more than 750 medical professionals who respond to approximately 140,000 service calls annually throughout Milwaukee, Waukesha, and Racine counties in Southeastern Wisconsin.

What You Need to Know about the University of Hawaii Cancer Center Data Breach

What You Need to Know about the University of Hawaii Cancer Center Data Breach

The University of Hawaii Cancer Center is the only National Cancer Institute-designated cancer center in Hawaii. Located in Honolulu, the center employs over 300 faculty and staff conducting critical epidemiological research studying cancer risks across diverse populations.

What You Need to Know about the Vikor Scientific Data Breach

What You Need to Know about the Vikor Scientific Data Breach

Vikor Scientific is a molecular diagnostics company based in Charleston, South Carolina, that now operates under the brand name Vanta Diagnostics.

What You Need to Know about the CarGurus Data Breach

What You Need to Know about the CarGurus Data Breach

CarGurus is a major online automotive marketplace founded in 2006 and publicly traded on NASDAQ under the ticker symbol CARG.

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Notice

By proceeding with this scan, you agree to let IDStrong run a Free Scan of supplied parameters of your personal information and provide free preliminary findings in compliance with our Terms of Use and Privacy Notice. You consent to us using your provided information to complete the Free Scan and compare it against our records and breach databases or sources to provide your Free preliminary findings report.

Rest assured: IDStrong will not share your information with third parties or store your information beyond what is required to perform your scan and share your results.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close