Cybersecurity2 hrs ago

Rituals Cosmetics Breach Exposes Member Data, No Passwords or Payment Data Compromised

Rituals confirms a breach that accessed names, emails, phones, DOB, gender and addresses but not passwords or payment details. Users are being notified.

Peter Olaleru/3 min/GB

Cybersecurity Editor

TweetLinkedIn
Rituals Cosmetics Breach Exposes Member Data, No Passwords or Payment Data Compromised
Source: BleepingcomputerOriginal source

Rituals disclosed a data breach where attackers downloaded part of its My Rituals member database, exposing personal details but not credentials or payment information. The intrusion has been contained and users are being notified.

Context

Rituals, a luxury cosmetics brand with annual revenues over €1 billion, detected unauthorized access to its systems earlier this month. Upon discovery, the company halted the download, launched a forensic investigation, and reported the incident to authorities. It has since confirmed that the intrusion is contained.

Key Facts

- Attackers accessed full name, email address, phone number, date of birth, gender, and home address. - No passwords or payment information were compromised, according to Rituals’ statement. - The exact number of affected members has not been disclosed. - No evidence suggests the stolen data is publicly available, and no ransomware group has claimed responsibility.

What It Means

The exposed data enables phishing and social‑engineering attacks targeting members. While the absence of passwords reduces immediate account takeover risk, the personal details can be used to craft convincing fraud attempts. Organizations should treat any member‑data exposure as a precursor to targeted credential‑phishing campaigns.

What Defenders Should Do

- Review and harden web‑application firewalls; apply patches for known vulnerabilities such as CVE‑2023‑XXXX (if applicable) and monitor for unusual database export patterns. - Enable multi‑factor authentication on all administrative accounts and monitor login attempts for anomalies. - Deploy detection rules for MITRE ATT&CK T1041 (Exfiltration Over C2 Channel) and T1566.001 (Spearphishing Attachment) to catch follow‑on phishing. - Advise users to verify unexpected communications and to reset passwords if they suspect credential reuse.

Watch for any public release of the stolen data or subsequent phishing campaigns targeting Rituals members.

TweetLinkedIn

More in this thread

Reader notes

Loading comments...