At a Glance
- A hacker group called Crimson Collective claimed on January 4, 2026 to have breached Brightspeed, a major multistate broadband provider whose public materials and court filings reference both Connect Holding II LLC and Connect Holding LLC, and taken data on more than one million residential customers.
- Brightspeed opened a cybersecurity investigation but, as of mid-January 2026, had not confirmed that any data was actually exfiltrated or that its production systems were compromised.
- The allegedly stolen data, according to the complaints filed, includes names, email addresses, phone numbers, billing and service addresses, account records, payment histories, and partial credit card and bank account numbers.
- Multiple putative class action lawsuits were filed in federal courts beginning January 7, 2026 — three days after Crimson Collective's public claim — with Polner v. Connect Holding LLC the earliest publicly indexed case in the Western District of North Carolina.
- All breach allegations come from Crimson Collective's claim or from the civil complaints; Brightspeed has not made an official public disclosure of a data breach as of this writing.
On January 4, 2026, a hacker group called Crimson Collective posted on Telegram claiming it had breached the systems of Brightspeed, a major multistate broadband provider, and taken personal records belonging to more than one million residential customers. The message named the company. It described the data. Within three days, the first federal lawsuit had been filed. None of it required Brightspeed to say a word.
The Claim and What It Contained
Brightspeed's public materials and related court filings refer to both Connect Holding II LLC and Connect Holding LLC in connection with the Brightspeed brand. The company serves more than one million residential customers across twenty states, primarily in rural and suburban communities that rely on it as their primary internet provider. Crimson Collective — a hacker group that, according to cybersecurity reporting, emerged in September 2025 and previously claimed responsibility for taking 570 gigabytes of data from Red Hat's internal systems — posted its claim on a public Telegram channel.
The group alleged it had obtained customer and account master records containing a broad range of personally identifying information: names, email addresses, phone numbers, billing addresses, service addresses, account statuses, and network assignment data. The plaintiffs in the lawsuits that followed also allege the compromised data included payment histories and payment methods, including partial credit card numbers and bank identification numbers.
A Security Boulevard report described a separate and potentially earlier dimension to the story: credentials associated with Brightspeed accounts, reportedly harvested by a strain of malware called the Vidar infostealer, had allegedly been circulating on underground markets before Crimson Collective's public announcement. This article has not independently verified those specific claims, which rely on a single secondary source. If accurate, the two events would appear to involve different pathways — infostealer malware targeting individual user devices on one hand and a claimed intrusion into the company's internal systems on the other — though both could affect the same customers.
Brightspeed confirmed it had opened a cybersecurity investigation. As of mid-January 2026, the company had not confirmed that data was actually exfiltrated or that production systems were compromised.
The Lawsuits That Followed the Post
Civil litigation began on January 7, 2026 — three days after Crimson Collective's Telegram post, before Brightspeed had released any public statement about a breach, and before most customers had received any notification. Plaintiffs' lawyers, monitoring threat actor channels and cybersecurity reporting, moved quickly. Multiple putative class actions were filed in federal courts in the weeks that followed.
Public docket records show that the earliest suit filed in the U.S. District Court for the Western District of North Carolina — where Brightspeed is headquartered in Charlotte — was Polner v. Connect Holding LLC d/b/a Brightspeed, No. 3:26-cv-00014, filed January 7, 2026. Later W.D.N.C. cases include Black v. Connect Holding II LLC d/b/a Brightspeed, No. 3:2026cv00026 (filed January 13, 2026), Riggs v. Connect Holding II LLC d/b/a Brightspeed, No. 3:2026cv00067 (filed January 23, 2026), and Frye v. Connect Holding LLC d/b/a Brightspeed, No. 3:2026cv00099 (filed February 6, 2026). Additional suits were reportedly filed in the Southern District of Ohio and the Northern District of Texas, though docket details for those cases have not been independently verified for this article.
The complaints share a common theory: Brightspeed collected and retained sensitive customer information, failed to implement reasonable cybersecurity measures to protect it, and left customers exposed to harm when that information was accessed or taken by unauthorized parties. The plaintiffs allege negligence and seek monetary damages, injunctive relief requiring the company to improve its data security, credit monitoring services, and attorneys' fees.
All breach-related facts in these lawsuits are stated as allegations. No court has made findings, and the case is at an early stage.
All breach-related facts come from Crimson Collective's public claim or from the civil complaints; Brightspeed had not confirmed a breach as of mid-January 2026.
What This Means If You're a Brightspeed Customer
The practical concern for customers is not whether any particular lawsuit succeeds — litigation of this kind often takes years to resolve. The concern is what may already be in circulation. If Crimson Collective's claim is accurate and the data described in the complaints was taken, customers whose names, addresses, email addresses, and partial payment information are in the dataset face an elevated risk of targeted phishing, account takeover attempts, and identity theft.
If the Security Boulevard report about Vidar infostealer activity is accurate, the credential dimension matters separately. Infostealer malware does not work by breaking into a company's servers — it infects individual users' devices and harvests stored credentials. If you are a Brightspeed customer and your device was compromised by such malware, your credentials for Brightspeed's systems may have been taken independently of whatever Crimson Collective did. Those two risks call for different responses: changing passwords and enabling two-factor authentication addresses the credential piece; monitoring credit reports and financial accounts addresses the billing data piece.
Brightspeed customers who believe their data was affected and who receive class notice as the lawsuits progress will have an opportunity to participate. Separately, every state has a breach-notification statute, but the duty to notify typically depends on whether the incident qualifies as a reportable breach under that state's statutory definitions and, in many states, whether the exposed data categories create a risk of harm. Because Brightspeed is a telecommunications carrier, it may also be subject to FCC rules requiring notification of breaches involving customer proprietary network information (CPNI). Whether any of these notification obligations are triggered depends on what Brightspeed's investigation determines about the scope and nature of the incident.
The Larger Pattern This Case Fits
The Brightspeed situation is not unusual in its broad shape. A threat actor makes a public claim. A company says it is investigating. Lawsuits are filed before the company says anything definitive. Customers wait — sometimes for months — to learn whether their data was involved and, if so, what to do about it.
What makes this case worth watching is the scale alleged — over one million customers across twenty states — and the combination of two distinct threat vectors reported: a claimed intrusion into internal company systems and, separately, reports of an infostealer campaign targeting individual device credentials. If both are accurate, each represents a different failure mode, and both carry real consequences for the people whose data sits at the intersection.
Whether Brightspeed ultimately confirms a breach, settles the lawsuits, or contests the claims, the company's customers are now navigating a period of elevated risk. That is the part of the story that does not wait for litigation to resolve.
This article is provided for informational purposes only and does not constitute legal advice. Reading this article does not create an attorney-client relationship with Wright Law Firm, PLC. Laws vary by jurisdiction and change frequently. Please consult a licensed attorney for advice specific to your situation.
All breach-related facts in this article are drawn from Crimson Collective's public claim, as reported by secondary sources, or from allegations in the civil complaints cited above. No court has made findings, and Brightspeed had not publicly confirmed a breach as of the reports reviewed for this article.