Did you know that insurance companies are like digital goldmines? They store information like Social Security numbers, financial information, health records, and more… But this is why they’re prime targets for hackers.
The Landmark Admin breach happened in May 2024, which affected millions of customers. It compromised personal details, such as full names, Social Security numbers, and medical information.

In the past two years, 28% of insurance companies have reported being breached, due to malware infection and at least one compromised credential. Most of the breaches involved third-party incidents.
What Happened
A bit of background for Landmark Admin:
It’s a third-party administrator who handles policy servicing and claims for major insurance carriers.
You can think of them as critical players behind the scenes, helping insurers manage sensitive customer information. This is what made the company an ideal target for hackers.
Timeline and Facts:
- October 2024: This was when Landmark first detected the unusual activity on its networks, which occurred on May 13th.
- November 2024: Landmark conducted an investigation, which confirmed that unauthorized access occurred, affecting over 800,000 people. The compromised personal information included:
- Full names
- Social Security numbers
- Home addresses
- Driver’s license numbers
- Tax identification numbers
- Passport numbers
- Financial account numbers
- Birthdates
- Health Insurance policy numbers
- Medical information
- Life and annuity policy information
- December 2024 - January 2025: Landmark started working with law enforcement and cybersecurity experts.
- February 2025: Landmark Admin issued a formal breach notification to affected partners.
- April 2025 – Today: In an update with the Maine Attorney General’s office, it was revealed that the affected individuals have doubled to more than 1.6 million.
Landmark has provided victims with 12 months' worth of credit monitoring and identity theft protection, hoping to reduce the risks.
The Risks for The Affected

You might think, “What’s the big deal?”
The thing is… cyber criminals and scammers can use leaked information for their attacks.
And it’s not just Landmark Admin; many other companies have been breached, and more are vulnerable, including social media platforms, healthcare organizations, hotels, and financial institutions.
Now… Here are the risks once you’re affected by a data breach:
- Risk No. 1 - Identity Theft: First, scammers can use your leaked information to steal your identity. They can open accounts, claim government benefits, file for insurance claims, and more, using your name. This can result in financial loss, damaged credit scores, and denied insurance.
- Risk No. 2 - Targeted Scams: Aside from identity theft, scammers can target you with attacks like phishing, phone call impersonation, bogus job offers, and romance scams. They will reference the information they got from you to make their claims more convincing.
- Risk No. 3 - Dark Web Exposure: Often, compromised data from data breaches is sold directly on the dark web. According to a study from Privacy Affairs, online banking credentials cost an average of $100 on the dark web, while a full range of documents that allow identity theft can be sold for about $1,000. Once your information is on the dark web, bad people can easily buy it.
What’s worse is that it’s hard or nearly impossible to remove your information from the dark web because of its anonymity, quick data sharing, and decentralized structure.
Ways to Protect Yourself

Now… If you believe you might've been affected by the Landmark Admin breach (or any breach), here are a few steps you can take:
- Step 1: Check if You Were Affected – Research online and look for data breach news or notification letters from companies or service providers.
- Step 2: Sign Up for Credit Monitoring – Companies usually offer this for free post-breach. So, check in with the company. If they didn’t offer and you can’t wait, you can sign up for yourself to ensure protection.
- Step 3: Freeze Your Credit – Remember, scammers can use your details to open accounts in your name, which can damage your credit. So, you should freeze your credit after a breach. It’s free! You just have to contact the credit bureaus.
- Step 4: Be Skeptical of Emails and Calls – After a breach, don’t trust emails and calls easily. Always verify and check for suspicious links or urgent requests for payment and personal information.
- Step 5: Use Strong, Unique Passwords – Login credentials are often compromised after a breach. So, make sure that you change passwords (strong and unique). It’ll also help to turn on multi-factor authentication so that bad guys won’t be able to access your accounts even if they got one password.
- Step 6: Limit Data Sharing – Be careful of what you share online, even on social media, because any database can be hacked.
- Step 7: Opt Out of Data Brokers – One way you can protect your personal information is by opting out of data brokers, which are companies that collect, share, and sell consumer data. You can do this by yourself, visiting each data broker website, or with the help of our service.
Conclusion
Overall, the Landmark Admin breach is a reminder that companies that have your data are vulnerable to data breaches.
While you can’t prevent a breach (and it’s not your responsibility to stop one), you can take the steps we've shared in this blog to protect yourself after one.
Remember to stay alert and skeptical!
Frequently Asked Questions
What is an example of a breach of client information?
Data breaches occur because of human error, malicious attacks, data handling failure, or faulty security systems. Some examples include physical theft of devices that store information, like laptops or paper records, being leaked.
What does it mean when it says my password was found in a breach?
If you got a warning about your password being found in a data breach, it means that hackers attacked one of your service providers and stole customer information, including your password.