Rituals Cosmetics Breach Exposes Member Data, No Passwords or Payment Data Compromised
Rituals confirms a breach that accessed names, emails, phones, DOB, gender and addresses but not passwords or payment details. Users are being notified.

TL;DR
Rituals disclosed a data breach where attackers downloaded part of its My Rituals member database, exposing personal details but not credentials or payment information. The intrusion has been contained and users are being notified.
Context
Rituals, a luxury cosmetics brand with annual revenues over €1 billion, detected unauthorized access to its systems earlier this month. Upon discovery, the company halted the download, launched a forensic investigation, and reported the incident to authorities. It has since confirmed that the intrusion is contained.
Key Facts
- Attackers accessed full name, email address, phone number, date of birth, gender, and home address. - No passwords or payment information were compromised, according to Rituals’ statement. - The exact number of affected members has not been disclosed. - No evidence suggests the stolen data is publicly available, and no ransomware group has claimed responsibility.
What It Means
The exposed data enables phishing and social‑engineering attacks targeting members. While the absence of passwords reduces immediate account takeover risk, the personal details can be used to craft convincing fraud attempts. Organizations should treat any member‑data exposure as a precursor to targeted credential‑phishing campaigns.
What Defenders Should Do
- Review and harden web‑application firewalls; apply patches for known vulnerabilities such as CVE‑2023‑XXXX (if applicable) and monitor for unusual database export patterns. - Enable multi‑factor authentication on all administrative accounts and monitor login attempts for anomalies. - Deploy detection rules for MITRE ATT&CK T1041 (Exfiltration Over C2 Channel) and T1566.001 (Spearphishing Attachment) to catch follow‑on phishing. - Advise users to verify unexpected communications and to reset passwords if they suspect credential reuse.
Watch for any public release of the stolen data or subsequent phishing campaigns targeting Rituals members.
Continue reading
More in this thread
Claude Mythos Breach Reveals Supply Chain Weaknesses in AI Model Access Controls
Peter Olaleru
Rituals Confirms Data Breach Exposes Member Names, Emails, Addresses; No Payment Data Stolen
Peter Olaleru
North Korean AI‑Driven Crypto Heist Nets $12M as Bitwarden CLI Breached and Spyware Spreads to 100 Governments
Peter Olaleru
Conversation
Reader notes
Loading comments...