HomeIntelligenceBrief
BREACH BRIEF🟠 High Breach

ShinyHunters Extorts AI‑Driven Merchant Platform Woflow, Exposing 447K Customer Records

LiveThreat™ Intelligence · 📅 May 07, 2026· 📰 haveibeenpwned.com
🟠
Severity
High
BR
Type
Breach
🎯
Confidence
HIGH
🏢
Affected
4 sector(s)
Actions
4 recommended
📰
Source
haveibeenpwned.com

ShinyHunters Extorts AI‑Driven Merchant Platform Woflow, Exposing 447K Customer Records

What Happened

In March 2026, the AI‑driven merchant data platform Woflow was targeted by the ShinyHunters extortion group. The attackers published over 2 TB of data, including 447,593 records containing email addresses, names, phone numbers and physical addresses belonging to Woflow’s customers and, by extension, the merchants that use its platform.

Why It Matters for TPRM

  • Exposure of end‑customer PII can cascade to downstream merchants, amplifying supply‑chain risk.
  • The breach may trigger regulatory notifications (e.g., GDPR, CCPA, PCI‑DSS) for both Woflow and its merchant clients.
  • Demonstrates the need for continuous vendor security assessments, especially for SaaS platforms handling large volumes of consumer data.

Who Is Affected

  • E‑commerce merchants and online retailers using Woflow
  • Payment processors and fintech services integrated with the platform
  • SaaS providers that rely on Woflow for customer data enrichment
  • Any organization that stores or processes the exposed PII for marketing, analytics, or fulfillment

Recommended Actions

  • Review contracts and SLAs with Woflow for breach‑notification clauses and remediation commitments.
  • Validate that multi‑factor authentication (MFA) and encryption are enforced for all Woflow integrations.
  • Request a detailed incident‑response report from Woflow, including root‑cause analysis and remediation steps.
  • Conduct a risk‑based assessment of downstream merchant exposure and notify affected parties as required.

Technical Notes

  • Attack vector: Data extortion via compromised backend systems; no specific CVE disclosed.
  • CVEs: []
  • Data types exposed: Email addresses, full names, phone numbers, physical mailing addresses.

Source: https://haveibeenpwned.com/Breach/Woflow

📰 Original Source
https://haveibeenpwned.com/Breach/Woflow

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.