The week of March 13-19, 2026 marks a concerning escalation in threat actor targeting of consumer identity platforms and critical infrastructure. Multiple high-impact incidents emerged, signaling a strategic shift toward data sources that enable large-scale identity theft and financial fraud across North America.
Infutor Exposure Potentially Impacts 676 Million Americans
The most significant incident involves Infutor, where threat actors claim to have exposed 676,798,866 unique records of American citizens. The allegedly compromised data includes full names, dates of birth, physical addresses, phone numbers, and Social Security numbers for hundreds of millions of American citizens, including deceased individuals. Infutor operates as a consumer identity management provider owned by Verisk, offering data-driven consumer intelligence to brands, marketers, and data platforms. The breach surfaced on underground forums on March 8, 2026, posted by a threat actor known as Spirigatito. While verification is ongoing, the scale represents one of the largest consumer data exposures ever documented.
Canadian Retail Giant Loblaw Confirms Network Breach
Canadian retailer Loblaw disclosed a data breach after threat actors gained access to customer information, with attackers accessing basic customer information such as names, email addresses, and phone numbers. Loblaw is one of Canada's largest food and pharmacy retailers, operating over 2,400 stores across Canada and owning brands such as Shoppers Drug Mart, No Frills, Real Canadian Superstore, and President's Choice. Cybercrime tracker Dark Web Informer alleges that the data breach is much wider in scope than the company has shared, with a hacker allegedly threatening to publicly leak all data if the company does not respond by March 19.
FBI Surveillance Systems Compromised by Threat Actors
The FBI became a victim of a cyber attack that affected its systems used to manage surveillance and wiretap warrants, with the nature and quantity of data compromised currently under investigation. This incident represents a direct compromise of federal law enforcement infrastructure and demonstrates threat actors' growing capability to penetrate highly secured government systems. Additionally, TELUS Digital confirmed it became a victim of a cyber attack orchestrated by the ShinyHunterz ransomware group, with the cyberattack compromising 1 petabyte of data belonging to its BPO customers, source codes, FBI background checks, financial information, voice recordings, and Salesforce data for various companies.
What Individuals Should Do
North American individuals should immediately place fraud alerts on their credit reports through all three major credit bureaus, as the combination of Social Security numbers and personal details from these breaches creates significant identity theft risk. Monitor financial accounts and credit reports weekly for unauthorized activity, particularly focusing on new account openings or unfamiliar transactions. Be especially cautious of phishing attempts that may reference recent purchases or account activity, as threat actors will likely use the stolen contact information for targeted social engineering campaigns.
What Businesses Should Do
Organizations must immediately audit their third-party data relationships, particularly with identity verification and consumer intelligence providers. Implement enhanced monitoring for credential stuffing attacks and account takeover attempts, as the volume of exposed personal information enables sophisticated social engineering against employees and customers. Review and strengthen access controls for surveillance and warrant management systems if applicable, following the FBI incident. Consider implementing additional verification steps for high-risk account changes, as traditional identity verification questions may now be compromised for millions of North Americans.