> Back to All Posts

Navia Data Breach Hits 2.7 Million People

Navia Data Breach

A benefits administrator most people have never heard of has exposed the sensitive personal data of nearly 2.7 million individuals across the United States. The Navia data breach is one of the largest employee benefits-related incidents in recent memory. And the ripple effects are still expanding.

Navia Benefit Solutions, headquartered in Renton, Washington, manages healthcare and spending account benefits on behalf of more than 10,000 U.S. employers. If your company offers a Flexible Spending Account, Health Savings Account, or COBRA coverage, there is a reasonable chance Navia handles the administration behind it. That is what makes this breach so significant. You do not need to be a Navia customer to be affected. You just need to be an employee at a company that uses its platform.

What Happened

Attackers gained unauthorized access to Navia’s systems on or around December 22, 2025. They maintained that access for nearly a month, quietly moving through the platform until January 15, 2026. Navia did not detect the suspicious activity until January 23, 2026, at which point the company launched a forensic investigation with external cybersecurity experts.

The investigation confirmed that the attackers used an API vulnerability to gain read-only access to participant data. They did not need to infiltrate the core network. They simply exploited an exposed application programming interface and pulled data directly. The breach was formally disclosed to the public on March 2, 2026, roughly five weeks after discovery.

Federal law enforcement and the U.S. Department of Health and Human Services were both notified when the intrusion came to light.

What Data Was Exposed

The Navia data breach compromised a wide range of personal and health-related information. Based on the official breach notification filed with the Maine Attorney General, exposed data includes:

  • Full names
  • Dates of birth
  • Social Security numbers
  • Phone numbers
  • Email addresses
  • Health plan information, including HRA, FSA, and COBRA enrollment details
  • Benefits metadata such as election dates, termination dates, and Navia account IDs

No financial account data and no claims information were included in the breach. That is a meaningful distinction, but it does not significantly reduce the risk. A combination of name, date of birth, and Social Security number is essentially everything a bad actor needs to commit identity theft or open fraudulent lines of credit.

Who Is Most at Risk

The most directly affected individuals are current and former employees at companies that used Navia for benefits administration. In Washington State alone, approximately 35,000 public employees and school workers were impacted, including members of the Public Employees Benefits Board and School Employees Benefits Board programs. Some of the affected records date back to 2018.

Washington officials also confirmed that children were caught up in the breach. Because many dependents are enrolled in parents’ healthcare plans, their personal details were stored in Navia’s systems alongside their parents’ information.

As of publication, no ransomware group or known threat actor has claimed responsibility for the attack.

The Broader Pattern

The Navia data breach does not exist in isolation. Benefits administrators and healthcare platform providers have become high-value targets for cybercriminals. That is because they aggregate enormous volumes of sensitive data from thousands of employer clients.

Just last month, TriZetto, a software provider that manages health insurance claims, disclosed a breach affecting three million people. Carriers and plan administrators including Landmark and Carruth Compliance Consulting have faced similar attacks in recent years. These organisations sit at the center of the U.S. healthcare and employment ecosystem, and many have historically underinvested in security relative to the value of the data they hold.

API vulnerabilities, specifically, are a growing attack surface. As companies increasingly rely on third-party integrations and software platforms to manage data, each API endpoint becomes a potential entry point. The Navia incident adds to a growing list of breaches where attackers never had to breach a firewall in the traditional sense. They simply found an exposed interface and walked in.

What Navia Is Doing

Navia has confirmed that it is offering affected individuals a free 12-month subscription to identity protection and credit monitoring through Kroll. Notification letters have been sent to affected individuals at their home addresses where contact information was available.

The company has also stated it is reviewing its data storage policies, access controls, and employee training programmes as part of its incident response.

Additionally, Navia faces multiple class action lawsuits filed in the weeks following the breach disclosure.

What You Should Do Now

If you receive a breach notification letter from Navia, or believe you may have been enrolled in an FSA, HSA, HRA, or COBRA plan administered by the company at any point, take these steps immediately.

Activate the free Kroll identity monitoring service if you are eligible. Place a fraud alert or credit freeze with all three major credit bureaus: Equifax, Experian, and TransUnion. A fraud alert requires lenders to verify your identity before extending credit. A credit freeze goes further and blocks new credit enquiries entirely.

Review your financial statements closely for transactions you do not recognise. Be cautious of phishing emails or calls that reference the breach by name. Social engineering attempts often follow major incidents like this one. Attackers pose as Navia representatives or identity protection services to gather additional information from already-worried victims.

If you believe your information has been misused, you can file a complaint at IdentityTheft.gov or contact the Federal Trade Commission directly.

Final Thoughts

The Navia data breach is a reminder that data exposure does not always come through the front door. Millions of people had no direct relationship with Navia, no login, no account, and no idea the company held their information. Yet their Social Security numbers, health plan details, and personal identifiers are now potentially in the hands of attackers.

The API exploit at the heart of this incident points to a structural problem across the benefits and healthcare administration sector. Sensitive data flows through interconnected platforms with varying levels of security scrutiny. Until that gap closes, breaches like this one will continue to reach people far beyond the company whose name appears in the headline.

Janet Andersen

Janet is an experienced content creator with a strong focus on cybersecurity and online privacy. With extensive experience in the field, she’s passionate about crafting in-depth reviews and guides that help readers make informed decisions about digital security tools. When she’s not managing the site, she loves staying on top of the latest trends in the digital world.