Seabury data breach exposes Social Security numbers of over 1,700 individuals

UpGuard Team
UpGuard Team
April 24, 2026

Key facts: Seabury data breach

  • Date occurred: January 15, 2026
  • Date discovered: March 28, 2026
  • Date reported: April 22, 2026
  • Target entity: Seabury
  • Source of breach: Unknown, unauthorized third-party
  • Data types: Names, addresses, Social Security numbers
  • Status: Confirmed; reported on April 22, 2026.
  • Severity: Medium; the exposure of Social Security numbers increases the long-term risk of identity theft and financial fraud.

What happened in the Seabury data breach?

Seabury (seaburylife.org), also known as Church Home of Hartford, Incorporated, reported a data breach that was publicly disclosed on April 22, 2026. The incident was triggered by unauthorized access to an email account, which was identified following the detection of unusual activity. No specific threat actor has been named in connection with the breach at this time.

The breach reportedly occurred on January 15, 2026, but was not discovered until March 28, 2026. The organization confirmed that 1,709 individuals were affected by the incident. Compromised information includes sensitive data such as names, addresses, and Social Security numbers. This medium-severity incident highlights the persistent risks associated with email-based security compromises, which can serve as a gateway for unauthorized third parties to access and exfiltrate sensitive personal information.

Who is behind the incident?

The attacker or cause of the incident has not been identified.

Impact and risks for Seabury customers

For the 1,709 individuals affected, the primary risk is the potential for identity theft and financial fraud resulting from the exposure of Social Security numbers. Malicious actors could use these details to attempt to open fraudulent accounts or file false tax returns. Additionally, the exposure of names and addresses increases the likelihood of targeted phishing attacks or mail-based scams aimed at the affected population.

Typical outcomes for breaches of this nature include heightened credit monitoring requirements and potential regulatory inquiries. Affected individuals should consider freezing their credit files with major bureaus and remaining vigilant for any suspicious account activity. Seabury has indicated it is working with cybersecurity specialists to improve its safeguards, which is a standard response to mitigate further risk.

How to protect against similar security incidents

Following the Seabury data breach involving Social Security numbers and unauthorized email access, affected individuals should take immediate steps to secure their personal information.

  • Enroll in credit monitoring and identity protection. Monitor your credit reports for any unauthorized accounts or suspicious inquiries. Consider placing a security freeze on your credit files at major bureaus to prevent new accounts from being opened. Utilize any identity theft protection services provided by the organization.
  • Implement phishing-resistant multi-factor authentication. Enable multi-factor authentication (MFA) on all sensitive accounts, particularly email and financial portals. Use hardware security keys or authenticator apps rather than SMS-based codes where possible. Be cautious of unsolicited communications requesting verification of personal details.
  • Maintain continuous security monitoring. Organizations should deploy attack surface management tools to identify and secure exposed assets. Regularly audit email account logs and permissions to detect unusual activity early. Ensure all staff are trained in recognizing sophisticated social engineering and phishing attempts.

Taking proactive steps to monitor personal records and strengthen account security is essential for mitigating the risks of identity theft.

Frequently asked questions

What happened in the Seabury security breach?

On April 22, 2026, Seabury (seaburylife.org) disclosed a security breach. According to initial reports, the organization discovered unusual activity on an email account that may have exposed the personal information of 1,709 individuals, including Social Security numbers.

When did the Seabury breach occur?

The Seabury breach was publicly reported on April 22, 2026. The attack took place on January 15, 2026, and was discovered by the organization on March 28, 2026.

What data was exposed?

The types of data involved in the Seabury incident include names, addresses, and Social Security numbers. This information was potentially accessed through a compromised email account.

Is my personal information at risk?

If you interacted with Seabury, there's a possibility your personal information could be affected. Similar incidents often involve email addresses, login details, or financial records. Stay alert for updates and take precautionary measures to secure your accounts.

What steps should companies take after being breached?

Seabury has taken steps to secure its systems and is consulting with cybersecurity specialists to enhance safeguards. The organization is notifying affected parties, providing guidance on protective actions, and reviewing its security measures to prevent future incidents.

This cybersecurity news article is powered by UpGuard Breach Risk — continuous attack surface monitoring for your organisation and supply chain.

How secure is ?

  • Check icon
    View our free preliminary report on ’s security posture
  • Check icon
    13 risk factors, including email security, SSL, DNS health, open ports and common vulnerabilities
Security ratings
Deliver icon

Sign up for our newsletter

UpGuard's monthly newsletter cuts through the noise and brings you what matters most: our breaking research, in-depth analysis of emerging threats, and actionable strategic insights.

Latest news

Stay up-to-date with the latest news in cybersecurity.
UpGuard customer support teamUpGuard customer support teamUpGuard customer support team

Protect your organization

Get in touch or book a free demo.
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan rating