
KCI Telecommunications (KCI), a Harrisburg, North Carolina-based engineering and professional services company specializing in telecom infrastructure, recently experienced a data breach.
The ransomware group Akira claimed responsibility for the attack, posting about it on the dark web on Sept. 19, 2025. The group alleged it obtained a wide range of sensitive corporate data, including employee dates of birth, addresses, emails, driver’s license numbers, phone numbers, confidential files, payment details, contracts, financial records, customer information, and non-disclosure agreements.
The breach was first discovered on Aug. 22, 2025, when the company detected suspicious activity within its network. KCI engaged third-party cybersecurity and digital forensics specialists to investigate and secure its systems.
The investigation determined that an unauthorized actor accessed certain segments of the company’s network, during which files were copied and potentially viewed or downloaded. The company reported the incident to federal law enforcement and undertook a comprehensive review of the impacted data, which allowed the company to identify the individuals and the specific information involved.
Despite claims, the confirmed types of consumer information exposed in this breach include personally identifiable information (PII), specifically names and Social Security numbers.
The breach was disclosed to the Maine Attorney General. Impacted individuals received written notice of the breach on Feb. 25, 2026.
The breach affected an undisclosed number of individuals in the United States, with one Maine resident confirmed as impacted.
For those affected, KCI is offering one year of complimentary credit monitoring and identity restoration services through Experian.
The company has also established a dedicated assistance phone line at 833-931-4244, available Monday through Friday, 9 a.m. to 9 p.m. Eastern Time (excluding U.S. holidays), to answer questions and provide support.
Affected individuals are encouraged to:








.webp)
.webp)
.webp)

.webp)
.webp)
.webp)
.webp)