Key facts: Straumann security incident
- Date reported: May 4, 2026
- Target Entity: Straumann USA, LLC
- Source of Incident: Unauthorized third-party access
- Status: Contained; system decommissioned
What happened in the Straumann security incident?
On May 4, 2026, Straumann Group disclosed a cybersecurity incident involving unauthorized access to a legacy system. This system, which was used for specific internal control processes between 2021 and 2024, is entirely separate from the company's core IT infrastructure.
Upon detection, Straumann immediately moved to contain the incident by shutting down and isolating the affected system. The company is currently in the process of permanently decommissioning the legacy environment. Importantly, Straumann has confirmed that its customer-facing systems, internal core infrastructure, and general business operations—including products and services—were not affected by this event.
Who is behind the incident?
The specific attacker or cause of the incident has not been identified. Straumann is currently taking appropriate steps with law enforcement and independent cybersecurity specialists as part of an ongoing investigation.
Potential Impact and risks for Straumann customers
According to official disclosures, the incident was limited to data associated with the legacy system. While an investigation is ongoing, Straumann has identified that the information involved may include the following for certain individuals:
- Contact and Identification Details: Names, email addresses, postal addresses, telephone numbers, and copies of signatures found in documents.
- Employment Information: Contract details and employment dates.
- Limited Identifiers: Social Security numbers.
- Limited Financial Data: Bank names and account numbers.
The company explicitly stated that no PINs or passwords were impacted. Furthermore, the exact data involved varies by individual, and there is currently no indication that any data has been misused.
Frequently Asked Questions
What happened in the Straumann cybersecurity incident?
Straumann Group recently identified and contained unauthorized access to a legacy system used for specific internal control processes. The incident was limited to this isolated system, which is separate from the company's core IT infrastructure and has since been shut down and decommissioned. Importantly, there is no impact to customer-facing systems, core internal systems, or the company’s ongoing operations and services.
When did the incident occur?
The incident was officially reported on May 4, 2026. The unauthorized access involved a legacy system used between 2021 and 2024.
What data may have been involved?
While the investigation is ongoing, findings indicate that the data involved may include contact and identification details (names, email and postal addresses, telephone numbers, and copies of signatures), limited employment-related information, and limited identifiers such as Social Security Numbers. Limited financial information, such as bank names and account numbers, may also be involved; however, no PINs or passwords were impacted.
Is my personal information at risk o?
At this stage, there is no indication that any data has been misused. However, because unauthorized access occurred, there is a potential risk of unsolicited communications, phishing attempts, or identity fraud. As a precaution, Straumann is providing 24 months of complimentary credit monitoring and identity restoration services through Experian to help safeguard personal information.
What actions has Straumann taken to address the situation?
Straumann took immediate steps to isolate and shut down the affected system to prevent further access.
The company has:
- Engaged independent cybersecurity specialists to lead the forensic investigation.
- Reported the matter to relevant data protection and law enforcement authorities.
- Strengthened security procedures and ensured that replacement systems operate in a reinforced environment.
- Notified potentially affected individuals and provided access to identity protection tools.
- Offered potentially impacted customers complimentary identity theft and credit monitoring services through Experian.
This cybersecurity news article is powered by UpGuard Breach Risk — continuous attack surface monitoring for your organisation and supply chain.






