Data Breach

440M records found online in unprotected database belonging to Estée Lauder

A security expert discovered that the Cosmetic firm Estée Lauder exposed 440 million records online in a database that was left unsecured.

The security expert Jeremiah Fowler discovered an unsecured database belonging to the Cosmetic firm Estée Lauder that contained 440,336,852 records.

Estée Lauder is an American multinational manufacturer and marketer of prestige skincare, makeup, fragrance and hair care products, it owns multiple brands, distributed internationally through both digital commerce and retail channels.

Fowler discovered the unsecured database on January 30 and attempted to report its discovery to the company. 

“On January 30th I discovered a non-password protected database that contained a massive amount of records totaling 440,336,852. Upon further review I was able to see connections to New York based cosmetic company Estée Lauder.” reads the post published by the researcher. “I could see audit logs that contained a large number of email addresses in each document. I immediately sent a responsible disclosure notice Estée Lauder alerting them to the exposure.”

The exposed data included user email addresses in plain text, the archive also contained Internal email addresses from the @estee.com domain. 

The archive included audit logs containing a large number of email addresses in each document. 

The archive also contained technical information, including IP addresses, ports, and paths, that could be used by attackers to gather intelligence on the company infrastructure.

“There were millions of records pertaining to middleware that is used by the Estée Lauder company. Middleware is software that provides common services and capabilities to applications outside of what’s offered by the operating system.” continues the post. “Data management, application services, messaging, authentication, and API management are all commonly handled by middleware. Another danger of this exposure is the fact that middleware can create a secondary path for malware, through which applications and data can be compromised.”

Fowler warns that the exposure of middleware records could allow attackers to create a secondary path for malware.

The good news is that the database was rapidly secured, no payment data or sensitive employee information was apparently stored in the archive. 

At the time it is not clear how many email addresses were exposed in the database and for how long the data was exposed online. The expert also remarked that it is not clear whether the data was accessed by third parties, including threat actors or not. 

“It is unclear exactly how many “user” email addresses were exposed. It is also unclear how long the Estée Lauder database was exposed or who else may have accessed the records.” concluded the post.

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – Data Leak, Estée Lauder)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

17 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

18 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

23 hours ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.