Mullinax Ford Data Breach Exposes 295 GB of Sensitive Personal Data

Published
April 16, 2026
Updated
April 16, 2026
Mullinax Ford Data Breach Exposes 295 GB of Sensitive Personal Data
Mullinax Ford
Affected by the data breach? You may be entitled to compensation. Submit a claim today.

Mullinax Ford of Central Florida, a Ford dealership in Apopka, Florida, disclosed a data breach that exposed sensitive personal information following a cyberattack on its computer systems in late 2025.

The breach was reported to the Maine Attorney General on April 15, 2026. Mullinax Ford discovered the breach on March 18, 2026, and began notifying affected consumers in writing on April 15, 2026.

What happened in the Mullinax Ford of Central Florida data breach

On Feb. 1, 2026, a ransomware group known as DragonForce claimed responsibility for the attack in a dark web posting on the Tor network. The group claimed to have obtained 294.65 GB of the dealership's data.

Mullinax Ford first became aware of suspicious activity in its computer environment on Dec. 27, 2025. The company launched an investigation with the assistance of third-party forensic specialists to determine the nature and scope of the event.

The investigation determined that an unauthorized actor gained access to certain Mullinax Ford systems between Dec. 4, 2025, and Dec. 25, 2025. During that roughly three-week period, information stored on those systems was accessed and copied by the unauthorized actor.

The company then reviewed the affected documents and identified the individuals whose information was contained in those files. The review took nearly three months to complete.

The types of personal information exposed in the breach included names, Social Security numbers and driver's license numbers.

Mullinax Ford of Central Florida's response to the breach

Mullinax Ford is offering affected individuals 24 months of complimentary identity monitoring services through Kroll at no cost.

The identity monitoring package includes single bureau credit monitoring, which alerts consumers when changes are made to their credit files. It also includes unlimited fraud consultation with Kroll specialists and identity theft restoration services.

Affected individuals can enroll in these services by visiting Kroll's enrollment website and entering the membership number included in their written notification letter. Enrollment must be completed by the deadline stated in each individual's letter.

The company has set up a dedicated phone line for questions about the incident. Affected individuals can call 844-403-4581, with representatives available Monday through Friday from 9 a.m. to 6:30 p.m. Eastern time, excluding holidays.

Individuals may also write to the company at 1551 E. Semoran Blvd., Apopka, FL 32703.

Steps to take if your information was exposed

  • Place a fraud alert or credit freeze. Contact Equifax (1-888-298-0045), Experian (1-888-397-3742) or TransUnion (1-833-799-5355) to help prevent new accounts from being opened using stolen information.
  • Request and review free credit reports. Visit AnnualCreditReport.com to check for unfamiliar accounts or suspicious activity.
  • Monitor financial account statements closely. Review bank and credit card statements regularly for unauthorized transactions over the next 12 to 24 months.
  • Be cautious of phishing attempts that reference this breach. Scammers may send emails, texts or phone calls posing as Mullinax Ford or Kroll in an effort to collect additional personal information.
  • Report suspected identity theft to the Federal Trade Commission. File a complaint at IdentityTheft.gov or call 1-877-438-4338.

SUBMIT YOUR CLAIM TO THE LAW FIRM HANDLING THIS INVESTIGATION

Types of INFORMATION affected
  • Names
    Names
  • Social security numbers
    Social Security Numbers
  • Dates of birth
    Dates of Birth
  • Addresses
    Addresses
  • Government IDs
    Government IDs
  • Medical Information
    Medical Info
  • Financial Info
    Financial Info
  • Affected information types not yet disclosed

Notice Letter

This browser does not support inline PDFs. Please download the PDF to view it: Download PDF

CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image