Navia Benefit Solutions, Inc., a U.S.-based benefits administrator, has disclosed a data breach affecting nearly 2.7 million individuals, exposing a range of sensitive personal information.
The company revealed that unauthorized access to its systems occurred between December 22, 2025, and January 15, 2026. However, the suspicious activity was not detected until January 23, prompting an immediate response and internal investigation.
Navia, which provides benefits administration services to over 10,000 employers across the United States, offers support for programs such as Flexible Spending Accounts (FSA), Health Savings Accounts (HSA), Health Reimbursement Arrangements (HRA), COBRA services, commuter benefits, and other employee-related offerings.
Data Exposed
The investigation confirmed that the attackers accessed and potentially exfiltrated several types of personal data, including:
- Full names
- Dates of birth
- Social Security numbers (SSNs)
- Phone numbers
- Email addresses
- HRA participation details
- FSA account information
- COBRA enrollment data
Navia clarified that financial details and claims data were not compromised. However, the exposed information is highly sensitive and could be used by cybercriminals to carry out phishing, identity theft, and social engineering attacks.
Response and Mitigation
Following the discovery, Navia took steps to contain the breach and assess its impact. The company has also notified federal law enforcement and is reviewing its security measures and data retention policies to strengthen its defenses against future incidents.
To support affected individuals, Navia is offering 12 months of free identity protection and credit monitoring services through Kroll. Impacted users are also advised to place fraud alerts and consider freezing their credit to prevent misuse of their personal information.
Current Status
As of now, no ransomware group has claimed responsibility for the breach, and the full scope of the attack remains under investigation.
This incident highlights how delayed detection remains one of the biggest risks in cybersecurity. A multi-week window of unauthorized access significantly increases the likelihood of data exfiltration and misuse, especially when highly sensitive information like SSNs is involved. Even without financial data exposure, the risk of identity theft and targeted phishing is substantial. Organizations handling large volumes of personal data must prioritize faster threat detection, stronger access controls, and continuous monitoring to reduce dwell time and limit impact.