On August 1, the US social commerce marketplace Poshmark disclosed a data breach.
The company discovered unauthorized access to its servers, the intruders stole personal information of the users, including usernames, hashed passwords, first and last names, gender information, and city of residence.
The attackers also accessed to clothing size preferences, user emails, and customers’ social media profile information. At the time is not clear when the incident occurred.
“We recently discovered that data from some Poshmark users was acquired by an unauthorized third party.” states the security notice published by the company.
“The data acquired does not include any financial or physical address information, and we do not believe your password was compromised.”
Even if the company IT staff doesn’t believe that users’ passwords were compromised, it recommends changing passwords as a precaution.
Below an abstract from the support website of the company related to the type of data involved:
Poshmark hired a security forensics firm to investigate the data breach, it has already conducted an audit that did not reveal any vulnerability.
The company is in the process of notifying U.S. users by email and has published the information on his blog and in the app.
Poshmark declared that Canadian users have not been affected by the incident.
“First and foremost, we want to assure you that the affected data does not include any financial or physical address information.” states the company.
“We do not believe user passwords were compromised during this incident because we use one-way encrypted passwords salted uniquely per user, making it nearly impossible to use these passwords to access an account.” concludes the company.
Below the list of recommendations published by the company:
| [adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – Poshmark, data breach)
[adrotate banner=”5″]
[adrotate banner=”13″]
Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…
A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…
A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…
Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…
Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…
This website uses cookies.