Thursday, April 3, 2025
HomeCyber Security NewsLensDeal Data Breach Exposes 100,000 Customers' Personal Information

LensDeal Data Breach Exposes 100,000 Customers’ Personal Information

Published on

SIEM as a Service

Follow Us on Google News

A major data breach involving LensDeal, a Netherlands-based contact lens supplier, has reportedly exposed the personal information of over 100,000 customers.

According to the Cyber Security Hub post, the breach affects 115,096 individuals and includes sensitive details such as full names, birthdates, email addresses, hashed passwords, IP addresses, and in some cases, company details.

Some customer records date back several years, while others are as recent as early 2025, hinting that the breach itself may be recent and far-reaching.

The data, which was allegedly stolen from LensDeal’s internal systems, has not yet been verified.

However, cybersecurity experts analyzing samples shared in the forum have noted that the data’s structure and formatting strongly suggest validity.

lensdeal in dark web forum
lensdeal in dark web forum

LensDeal has yet to issue an official statement on the matter, leaving customers and privacy advocates in the dark about the company’s response.

A Serious Threat to Privacy

The exposed information poses a significant risk to the affected individuals, according to cybersecurity specialists.

The combination of names, contact details, and other personal information creates an ideal scenario for malicious actors to conduct phishing attacks, identity theft, or unauthorized account access.

Experts are urging LensDeal customers to respond proactively. Immediate steps include:

  • Changing account passwords: Customers should also avoid reusing old passwords and adopt stronger, unique ones.
  • Monitoring financial and online accounts: Any suspicious activity should be reported immediately to service providers or relevant authorities.
  • Staying vigilant: Customers should be wary of emails or messages requesting personal or financial information, especially those masquerading as LensDeal.

If confirmed, the LensDeal breach will add to the growing trend of European e-commerce platforms becoming targets for hackers.

With cybercriminals increasingly exploiting vulnerabilities in online retailers, including small and medium-sized enterprises, consumers’ data often becomes collateral damage.

The incident underscores the urgent need for businesses to adopt robust cybersecurity measures, such as encrypted customer databases and timely security audits.

 Customers, too, must remain informed and cautious about the online platforms they engage with.

As the situation develops, LensDeal’s silence has drawn criticism, with users and experts calling for transparency from the company.

Authorities and independent groups are expected to investigate the breach further to verify its scope and legitimacy.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Cisco AnyConnect VPN Server Vulnerability Allows Attackers to Trigger DoS

Cisco has disclosed a significant vulnerability in its AnyConnect VPN Server for Meraki MX and Z...

New Trinda Malware Targets Android Devices by Replacing Phone Numbers During Calls

Kaspersky Lab has uncovered a new version of the Triada Trojan, a sophisticated malware...

DarkCloud Stealer Uses Weaponized .TAR Archives to Target Organizations and Steal Passwords

A recent cyberattack campaign leveraging the DarkCloud stealer has been identified, targeting Spanish companies...

SonicWall Firewall Vulnerability Enables Unauthorized Access

Researchers from Bishop Fox have successfully exploited CVE-2024-53704, an authentication bypass vulnerability that affects SonicWall...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Cisco AnyConnect VPN Server Vulnerability Allows Attackers to Trigger DoS

Cisco has disclosed a significant vulnerability in its AnyConnect VPN Server for Meraki MX and Z...

New Trinda Malware Targets Android Devices by Replacing Phone Numbers During Calls

Kaspersky Lab has uncovered a new version of the Triada Trojan, a sophisticated malware...

DarkCloud Stealer Uses Weaponized .TAR Archives to Target Organizations and Steal Passwords

A recent cyberattack campaign leveraging the DarkCloud stealer has been identified, targeting Spanish companies...