Cybersecurity2 hrs ago

Rituals Confirms Data Breach Exposes Member Names, Emails, Addresses; No Payment Data Stolen

Rituals confirmed an unauthorized download of member data from its My Rituals database, exposing names, emails, phone numbers, birth dates, gender and addresses while stating no passwords or payment information were accessed. The company launched a forensic investigation and reported the breach to authorities.

Peter Olaleru/3 min/GB

Cybersecurity Editor

TweetLinkedIn
Rituals Confirms Data Breach Exposes Member Names, Emails, Addresses; No Payment Data Stolen
Source: WalmartOriginal source

Rituals confirmed an unauthorized download of member data from its My Rituals database, exposing names, emails, phone numbers, birth dates, gender and home addresses while stating that no passwords or payment information were accessed.

Context

The luxury cosmetics brand Rituals, which reports annual revenues exceeding €1 billion, disclosed the breach earlier this month after detecting an illicit download of part of its members’ database. The company said it acted promptly to stop the exfiltration, launched a forensic investigation and notified the relevant authorities. Affected My Rituals members are now being notified directly.

Key Facts

- Attackers obtained personal data including full name, email address, phone number, date of birth, gender and home address. - Rituals emphasized that passwords and payment card details were not accessed. - The firm has contained the intrusion and is conducting an in‑depth forensic review to determine how the breach occurred. - The breach has been reported to law‑enforcement and data‑protection regulators; no ransomware group has claimed responsibility and the total number of impacted records remains undisclosed.

What It Means

For members, the exposed information increases the risk of targeted phishing and social‑engineering attacks, though the absence of credentials reduces immediate account‑takeover danger. From a regulatory standpoint, the incident triggers obligations under the UK GDPR to notify the Information Commissioner’s Office within 72 hours of discovery; Rituals’ prompt reporting suggests compliance with that timeline. The breach also highlights the value attackers place on loyalty‑program data, which can be used for identity‑theft or sold on underground markets even without financial details.

Mitigations

For individuals: - Treat any unexpected email or SMS requesting personal information as suspicious; verify the sender through official channels. - Consider enabling multi‑factor authentication on any online accounts that reuse the same email address. - Monitor financial statements and credit reports for signs of misuse.

For organizations: - Review access controls on member databases; enforce least‑privilege and segregate personal data from application servers. - Enable logging of database queries and set alerts for abnormal export volumes (MITRE ATT&CK T1041 – Exfiltration Over Web Service). - Ensure data‑loss‑prevention (DLP) rules block outbound transfers of personally identifiable information to unauthorized endpoints. - Conduct regular penetration testing and credential‑audit exercises to reduce the risk of valid‑account abuse (MITRE ATT&CK T1078). - Keep incident‑response plans updated and test them tabletop‑style to ensure rapid containment and regulator notification.

What to watch next: The outcome of Rituals’ forensic investigation, any formal action from the UK ICO, and whether the stolen data appears in underground markets.

TweetLinkedIn

More in this thread

Reader notes

Loading comments...