Mango says some customer information exposed in cyber incident

Spanish fast-fashion retailer Mango said that one of its external marketing service providers suffered a data breach exposing limited customer information, though its own corporate systems were not affected.

In a statement on Tuesday, the company said the compromised data included customers’ first names, countries, postal codes, email addresses and phone numbers, but did not include last names, passwords or financial information such as credit card or banking details.

“Mango’s infrastructure and corporate systems have not been compromised,” the company said, adding that it had notified the Spanish Data Protection Agency (AEPD) and other authorities in line with regulations.

Mango’s top markets include Spain, France and Turkey. The company has dozens of U.S. stores and more than 2,700 worldwide.

The incident is the latest in a string of cyberattacks targeting Spanish and global retailers. In March, El Corte Ingles disclosed that a breach at one of its third-party suppliers exposed customer identification and credit card details. Another Spanish chain, Tendam, was hit by hackers who reportedly stole 720 gigabytes of data and demanded an €800,000 ransom.

Retailers across Europe have also been hit. Earlier this year, Co-op UK said a cyberattack wiped $274 million off its revenues, while Louis Vuitton confirmed breaches at its stores in Turkey, South Korea and the U.K. exposed customer data. Other global brands, including Victoria’s Secret, Dior, Tiffany, and Adidas, have also faced cyber incidents in recent months.

Mango said it detected the incident over the weekend and immediately activated its security protocols. Its online operations were not disrupted.

“We recommend that all our customers pay attention to any suspicious communications or requests for unusual actions, both by email and by phone,” the company added. 

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Over 100 VS Code Extensions Exposed Developers to Hidden Supply Chain Risks

Next Post

F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion

Related Posts

ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet

Oligo Security has warned of ongoing attacks exploiting a two-year-old security flaw in the Ray open-source artificial intelligence (AI) framework to turn infected clusters with NVIDIA GPUs into a self-replicating cryptocurrency mining botnet. The activity, codenamed ShadowRay 2.0, is an evolution of a prior wave that was observed between September 2023 and March 2024. The attack, at its core,
Read More

⚡ Weekly Recap: Cisco 0-Day, Record DDoS, LockBit 5.0, BMC Bugs, ShadowV2 Botnet & More

Cybersecurity never stops—and neither do hackers. While you wrapped up last week, new attacks were already underway. From hidden software bugs to massive DDoS attacks and new ransomware tricks, this week’s roundup gives you the biggest security moves to know. Whether you’re protecting key systems or locking down cloud apps, these are the updates you need before making your next security
Read More