Pax8 Email Error Exposes MSP Partner Licensing and Customer Lists

Related

VoiceRun’s $5.5M Seed Round Signals Enterprise Voice AI Maturation

What happened VoiceRun, a Cambridge, Massachusetts–based startup offering a code‑first...

Pax8 Email Error Exposes MSP Partner Licensing and Customer Lists

What happened A Pax8 email error exposes MSP partner licensing...

Victorian Department of Education Breach Exposes Student Account Data

What happened A Victorian Department of Education breach exposes student...

Malware Campaign Using Fake Charities Targets Ukraine’s Defense Forces

What happened A malware campaign using fake charities targets Ukraine’s...

Windows Secure Boot Certificates Near Expiration, Risking Boot Failures Without Updates

What happened Windows Secure Boot certificates near expiration, risking boot...

Share

What happened

A Pax8 email error exposes MSP partner licensing and customer lists after a mis‑sent email on January 13, 2026 included a spreadsheet with internal business information for approximately 1,800 managed service provider partners, including names, Microsoft SKU details, license counts, and renewal dates in the attachment. The cloud marketplace distributor Pax8 confirmed that fewer than 40 UK‑based partner recipients received the unintended file and subsequently requested deletion, noting that the data did not contain personally identifiable information but did include commercial licensing and customer portfolio details. Some recipients reported that threat actors have approached MSPs offering to buy the dataset, which could be leveraged for competitive or malicious targeting. 

Who is affected

Affected parties include approximately 1,800 MSP partners connected to Pax8, whose internal business and licensing data was exposed indirectly through the mistaken distribution of an internal spreadsheet. 

Why CISOs should care

Exposure of partner‑specific business data can fuel competitive intelligence abuse, targeted phishing, business email compromise campaigns, or social engineering efforts against MSPs and their customers. 

3 practical actions

  • Enforce internal email safeguards: Implement DLP and review outbound communications to catch sensitive attachments.
  • Notify partners promptly: Communicate transparently with affected MSP partners and guidance for secure deletion.
  • Audit data handling policies: Reinforce controls around distribution of partner business data.