Breached Signals: Unraveling the Freedom Mobile Data Hack and Its Ripples Through Canadian Telecom
In the early hours of a routine October day in 2025, Freedom Mobile, Canada’s fourth-largest wireless carrier, detected unusual activity within its customer account management platform. What followed was a swift investigation revealing a sophisticated breach that compromised personal information for a limited but unspecified number of customers. Hackers, exploiting a subcontractor’s account, gained unauthorized access and siphoned off data including full names, postal addresses, dates of birth, phone numbers, and account numbers. This incident, first spotted on October 23, underscores the persistent vulnerabilities in telecom infrastructure, even as companies bolster defenses against an ever-evolving array of cyber threats.
Freedom Mobile’s response was prompt: the company terminated the illicit access, disinfected the compromised systems, and notified affected customers through breach letters. Importantly, the carrier emphasized that sensitive financial details like payment information and passwords remained untouched. Yet, the stolen data—while not including credit card numbers—poses significant risks for identity theft, phishing scams, and targeted fraud. As reported in TechRadar, the breach highlights how third-party access points can serve as weak links in otherwise fortified networks, a recurring theme in recent cyber incidents across the sector.
The timing of this disc
Source: https://www.webpronews.com/freedom-mobile-data-breach-hackers-steal-customer-info-in-2025-attack/
Freedom Mobile cybersecurity rating report: https://www.rankiteo.com/company/freedom-mobile
"id": "FRE1764898604",
"linkid": "freedom-mobile",
"type": "Breach",
"date": "12/2025",
"severity": "85",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'incident': {'affected_entities': [{'customers_affected': 'Limited but '
'unspecified number',
'industry': 'Telecommunications',
'location': 'Canada',
'name': 'Freedom Mobile',
'size': 'Fourth-largest wireless carrier '
'in Canada',
'type': 'Wireless Carrier'}],
'attack_vector': 'Third-party subcontractor account exploitation',
'customer_advisories': 'Breach letters sent to affected '
'customers',
'data_breach': {'data_encryption': None,
'data_exfiltration': 'Yes',
'file_types_exposed': None,
'number_of_records_exposed': None,
'personally_identifiable_information': 'Yes',
'sensitivity_of_data': 'High (personally '
'identifiable '
'information)',
'type_of_data_compromised': ['Full names',
'Postal addresses',
'Dates of birth',
'Phone numbers',
'Account numbers']},
'date_detected': '2025-10-23',
'description': 'Freedom Mobile detected unusual activity within '
'its customer account management platform, '
'revealing a sophisticated breach that '
'compromised personal information for a limited '
'but unspecified number of customers. Hackers '
'exploited a subcontractor’s account to gain '
'unauthorized access and siphon off data '
'including full names, postal addresses, dates of '
'birth, phone numbers, and account numbers.',
'impact': {'brand_reputation_impact': 'Significant',
'conversion_rate_impact': None,
'customer_complaints': None,
'data_compromised': 'Personal information (full '
'names, postal addresses, dates '
'of birth, phone numbers, account '
'numbers)',
'downtime': None,
'financial_loss': None,
'identity_theft_risk': 'High',
'legal_liabilities': None,
'operational_impact': None,
'payment_information_risk': 'None (payment '
'information and '
'passwords were not '
'compromised)',
'revenue_loss': None,
'systems_affected': 'Customer account management '
'platform'},
'initial_access_broker': {'backdoors_established': None,
'data_sold_on_dark_web': None,
'entry_point': 'Subcontractor’s '
'account',
'high_value_targets': None,
'reconnaissance_period': None},
'lessons_learned': 'Third-party access points can serve as weak '
'links in otherwise fortified networks.',
'post_incident_analysis': {'corrective_actions': None,
'root_causes': 'Exploitation of '
'third-party '
'subcontractor '
'account'},
'ransomware': {'data_encryption': None,
'data_exfiltration': None,
'ransom_demanded': None,
'ransom_paid': None,
'ransomware_strain': None},
'references': [{'date_accessed': None,
'source': 'TechRadar',
'url': None}],
'regulatory_compliance': {'fines_imposed': None,
'legal_actions': None,
'regulations_violated': None,
'regulatory_notifications': None},
'response': {'adaptive_behavioral_waf': None,
'communication_strategy': 'Notified affected '
'customers through breach '
'letters',
'containment_measures': 'Terminated illicit access, '
'disinfected compromised '
'systems',
'enhanced_monitoring': None,
'incident_response_plan_activated': 'Yes',
'law_enforcement_notified': None,
'network_segmentation': None,
'on_demand_scrubbing_services': None,
'recovery_measures': None,
'remediation_measures': None,
'third_party_assistance': None},
'title': 'Freedom Mobile Data Hack',
'type': 'Data Breach'}}