HomeIntelligenceBrief
BREACH BRIEF🟠 High Breach

ShinyHunters Breach Exposes Hims & Hers Customer Support Ticket Data via Compromised Zendesk Platform

In early February 2024, the ShinyHunters extortion gang leveraged compromised Okta SSO credentials to infiltrate Hims & Hers' Zendesk customer‑support system, stealing names, contact details and support‑ticket content. The breach highlights the systemic risk of third‑party SaaS dependencies for healthcare providers and underscores the need for hardened identity‑management practices.

LiveThreat™ Intelligence · 📅 April 07, 2026· 📰 malwarebytes.com
🟠
Severity
High
BR
Type
Breach
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
3 recommended
📰
Source
malwarebytes.com

Support Platform Breach Exposes Hims & Hers Customer Support Ticket Data

What Happened — On February 4‑7 2024 attackers accessed the third‑party Zendesk support platform used by telehealth provider Hims & Hers and stole support‑ticket records containing names, contact details and other personally‑identifiable information. The intrusion was traced to the ShinyHunters extortion gang, which leveraged compromised Okta SSO credentials to gain access to the SaaS environment.

Why It Matters for TPRM

  • Third‑party SaaS platforms (e.g., Zendesk, TELUS Digital) are high‑value attack surfaces that can expose downstream customers.
  • Credential‑based SSO compromises bypass traditional perimeter controls, amplifying supply‑chain risk.
  • Even non‑medical data (names, phone numbers, health‑related support topics) can be weaponized for targeted phishing or extortion.

Who Is Affected — Telehealth and broader healthcare providers that rely on outsourced customer‑support SaaS solutions; downstream patients whose support tickets were stored in the compromised system.

Recommended Actions

  • Review all vendor contracts for security‑by‑design clauses and SSO governance.
  • Enforce MFA, credential‑rotation, and least‑privilege for any third‑party SSO integrations.
  • Conduct a rapid audit of all support‑ticket repositories for exposure and notify affected individuals.

Technical Notes — Attack vector: compromised Okta SSO credentials (social‑engineering + phishing) used to access a Zendesk instance (third‑party dependency). No known CVE; data exfiltrated includes names, email addresses, phone numbers, and details of support requests (no medical records). Source: Malwarebytes Labs

📰 Original Source
https://www.malwarebytes.com/blog/data-breaches/2026/04/support-platform-breach-exposes-hims-hers-customer-data

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.