Frontier Data Breach Impacts 751,895 Customers. Here's What Was Leaked.

Will Gendron
Editor in Chief
Published
June 7, 2024
Updated
September 17, 2024
Frontier Data Breach Impacts 751,895 Customers. Here's What Was Leaked.
Frontier Communications
Types of INFORMATION affected
  • Names
    Names
  • Social security numbers
    Social Security Numbers
  • Dates of birth
    Dates of Birth
  • Addresses
    Addresses
  • Government IDs
    Government IDs
  • Medical Information
    Medical Info
  • Financial Info
    Financial Info

On April 14, 2024, Frontier Communications Parent, Inc. discovered unauthorized access to their internal IT systems. This breach exposed the personal information of 751,895 individuals across the United States. Among those affected, 88,836 were from Texas and 139 were from Maine.

The compromised data includes sensitive consumer information such as:

  • Social Security Numbers
  • Names
  • Addresses
  • Dates of Birth

The breach was publicly disclosed on June 6, 2024, and Frontier promptly notified consumers via written U.S. mail. The data breach was also reported to the Attorney General's offices in Maine, Texas, and California. You can review the detailed disclosure on the Maine Attorney General's website, the Texas Attorney General's website, and the California Attorney General's website.

Frontier's Response

Upon discovering the breach, Frontier Communications took immediate action to contain the incident and secure its systems. The company engaged leading cybersecurity experts to investigate the breach and bolster its network security measures. Additionally, Frontier Communications notified law enforcement and relevant regulatory authorities to ensure a comprehensive response.

To support affected individuals, Frontier Communications is offering one year of complimentary credit monitoring and identity theft resolution services through Kroll. These services include single bureau credit monitoring, fraud consultation, and identity theft restoration, providing a robust safety net for those impacted by the breach.

Steps to Take if You Are Affected by the Data Breach

Given the severity of the breach and the sensitive nature of the exposed information, it is crucial for affected individuals to take the following steps:

  1. Activate Credit Monitoring Services: Utilize the complimentary credit monitoring and identity theft resolution services offered by Frontier through Kroll. Visit Kroll's activation website to get started.
  2. Order Your Free Credit Report: Regularly review your credit report for any suspicious activity. You can obtain a free credit report from Annual Credit Report or by calling 877-322-8228.
  3. Place a Fraud Alert: Consider placing a fraud alert on your credit file to protect against identity theft. This alert notifies creditors to take extra steps to verify your identity before opening new accounts. You can contact any of the three major credit bureaus—Equifax, Experian, or TransUnion—to place a fraud alert.
  4. Place a Security Freeze: A security freeze prevents creditors from accessing your credit file without your consent. This can be done by contacting the credit bureaus directly.
  5. Monitor Financial Statements: Keep a close eye on your bank and credit card statements for any unauthorized transactions.
  6. Report Identity Theft: If you suspect that your identity has been stolen, report it to local law enforcement, your state Attorney General, and the Federal Trade Commission (FTC). The FTC's website, IdentityTheft.gov, provides comprehensive resources on how to handle identity theft.

Notice Letter

This browser does not support inline PDFs. Please download the PDF to view it: Download PDF

Consumers Notification date
6/6/2024
Date of Breach
Breach Discovered Date
4/14/2024
Total People Affected
751895
Information Types Exposed
- Social Security Number - Name of individual - Address - Social Security Number Information - Date of Birth

Join the

Frontier Communications

data breach lawsuit. It's free to join. 

Join the Lawsuit
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image