
On Sept. 24, 2025, Evolve Mortgage Services, a Texas-based provider of outsourced mortgage services and technology platforms for financial institutions, discovered suspicious activity in its network. The incident potentially affects thousands of individuals whose mortgage information was processed by Evolve on behalf of various financial institutions.
The breach is believed to have occurred between Sept. 17 and Sept. 24, 2025.
This incident was linked to a ransomware attack by the group INC RANSOM, which claimed to have stolen 20 terabytes of data, including two terabytes of sensitive databases The attackers reportedly accessed and exfiltrated a wide array of personally identifiable information provided to Evolve by its financial institution clients.
According to the ransomware group’s dark web posting on Oct. 30, 2025, the stolen data included Social Security numbers, scans of client IDs, home and work addresses, personal and work phone numbers, full credit histories and confidential PII forms dating back to 2016.
Current public disclosures have noted that the following information types were confirmed to be included in the exposure: name, Social Security number, driver’s license number, government-issued ID number, and financial account information.
The breach was officially disclosed to the attorneys general of California, Indiana, Maine, New Hampshire, and Texas starting on Feb. 4, 2026. The breach was also disclosed to the Massachusetts Office of Consumer Affairs and Business Regulation.
The total number of individuals affected is 6,669, including 557 Texas residents, 108 Massachusetts residents, 51 Indiana residents15 Maine residents, and ten New Hampshire residents were impacted.
For those affected, Evolve is offering twelve months of complimentary credit monitoring and identity protection services through Cyberscout, a TransUnion company. Impacted individuals are encouraged to enroll in these services within ninety days of receiving their notification letter.
Evolve has also advised affected individuals to remain vigilant for the next twelve to twenty-four months by regularly reviewing credit reports and account statements for suspicious activity.
Given the severity and method of the breach, it is especially important for those notified to:
Additional resources and detailed instructions for protecting personal information are included in the notification letter and are available through Cyberscout.








.webp)
.webp)
.webp)

.webp)
.webp)
.webp)
.webp)