Doxim Data Breach Exposed These Types of Sensitive Personal Info

Will Gendron
Editor in Chief
June 18, 2024
July 19, 2024
Doxim Data Breach Exposed These Types of Sensitive Personal Info

On December 25, 2023, and December 30, 2023, Doxim, Inc., a prominent player in the customer communications management and engagement technology sector, experienced a significant data breach. The breach involved unauthorized access to files containing sensitive personal information of individuals associated with various financial services, utilities, and healthcare institutions.

Doxim detected suspicious activity within the portion of its computer network supporting its credit union services. The company promptly took these systems offline, notified law enforcement, and engaged cybersecurity experts to investigate the situation.

Following an in-depth review, it was discovered that files had been removed from Doxim’s network. These files included personal information such as names, mailing addresses, account numbers, and Social Security numbers. The breach is severe, given the nature of the data exposed and the potential implications for identity theft and financial fraud.

Information Exposed:

  • Names
  • Mailing addresses
  • Account numbers
  • Social Security numbers

Doxim's Response

In response to the breach, Doxim has taken several steps to mitigate the impact and prevent future incidents. The company has been actively supporting federal law enforcement’s criminal investigation. They have also engaged industry-leading cybersecurity experts to fortify their cybersecurity defenses. Additionally, Doxim has retained a third-party service to monitor online forums and marketplaces for information relating to the breach.

To assist affected individuals, Doxim is offering 12 months of complimentary credit monitoring and identity protection services through Kroll. This includes single bureau credit monitoring, $1 million identity fraud loss reimbursement, fraud consultation, and identity theft restoration services.

Steps for Affected Individuals

If you believe you have been affected by this data breach, it is crucial to take immediate action to protect your identity and personal information. Here are some recommended steps:

  1. Review Your Credit Reports: Regularly monitor your credit reports for any suspicious activity. You are entitled to one free copy of your credit report every 12 months from each of the three major credit reporting companies. Visit Annual Credit Report to obtain your reports.
  2. Place Fraud Alerts: Consider placing a fraud alert on your credit reports. This will notify creditors to take extra steps to verify your identity before opening new accounts. You can place a fraud alert by contacting one of the three major credit bureaus: Equifax, Experian, or TransUnion.
  3. Place Security Freezes: A security freeze prevents new creditors from accessing your credit report entirely, making it more challenging for identity thieves to open accounts in your name. Contact each of the three credit bureaus to place a freeze.
  4. Monitor Account Statements: Carefully review your financial account statements for any unauthorized transactions and report any suspicious activity to your financial institution immediately.
  5. Obtain an Identity Protection PIN from the IRS: This six-digit PIN helps prevent someone else from filing a tax return using your Social Security Number. For more information, visit the IRS website on Identity Protection PIN.

For more detailed information about the breach and the steps you can take to protect yourself, you can view the full notice to consumers on the California Attorney General's website.

Notice Letter

This browser does not support inline PDFs. Please download the PDF to view it: Download PDF

Affected Entity
Consumers Notification date
Date of Breach
December 25, 2023
Breach Discovered Date
Total People Affected
Information Types Exposed
- Name - Mailing address - Account number - Social Security number

Join the


data breach lawsuit. It's free to join. 

Join the Lawsuit
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image