Hims & Hers Discloses Breach After Zendesk System Compromise
Telehealth company Hims & Hers reveals data breach affecting customer support tickets. ShinyHunters gang exploited Okta SSO to access Zendesk platform.
Telehealth giant Hims & Hers Health disclosed a data breach this week after threat actors compromised its Zendesk customer support platform, stealing support tickets containing customer personal information. The company filed breach notifications with the California Attorney General on April 2, 2026, revealing an attack timeline spanning early February.
What Happened
According to the filing, unauthorized access to Hims & Hers' Zendesk instance occurred between February 4 and February 7, 2026. The company's Cybersecurity Operations Center discovered suspicious activity on February 5, prompting an investigation that concluded on March 3.
The attackers exploited Okta single sign-on credentials to access the Zendesk platform. Rather than targeting Hims & Hers directly, the threat actors compromised employee Okta accounts through social engineering, then pivoted to cloud services authenticated through that SSO infrastructure.
BleepingComputer reports that the ShinyHunters extortion gang conducted the breach as part of a broader campaign targeting organizations through their Okta integrations. The group has been linked to multiple high-profile breaches exploiting cloud service misconfigurations and SSO vulnerabilities.
Data Compromised
The breach exposed customer names, email addresses, phone numbers, and physical addresses stored in support tickets. Hims & Hers emphasized that no medical records or doctor communications were compromised—the attackers only accessed the customer service platform, not clinical systems.
This distinction matters for regulatory purposes. Healthcare data breaches involving protected health information under HIPAA carry different notification requirements and potential penalties than breaches of general customer data. By limiting their access to Zendesk, the attackers may have inadvertently reduced their leverage for extortion.
Third-Party Risk in Healthcare
The Hims & Hers breach highlights the expanding attack surface created by SaaS dependencies. Modern telehealth companies rely on dozens of cloud services: appointment scheduling, payment processing, prescription management, customer support, marketing automation. Each integration represents a potential entry point.
We've seen this pattern repeatedly. The Hasbro cyberattack disclosed last week similarly involved third-party service compromise, as did the Intesa Sanpaolo incident that resulted in a 31 million euro GDPR fine. Organizations are learning the hard way that their security posture is only as strong as their weakest vendor.
The Okta attack vector is particularly concerning. SSO providers hold the keys to dozens or hundreds of connected applications. Compromise the SSO account, and attackers can often access everything the user can access without needing to crack individual application credentials.
ShinyHunters' Growing Footprint
ShinyHunters has emerged as one of the most active data extortion groups of 2026. Unlike traditional ransomware gangs that encrypt systems and demand payment for decryption, ShinyHunters focuses on data theft and extortion. They steal information, threaten to publish it, and demand payment—without the operational complexity of deploying ransomware.
This approach targets cloud-native organizations that may not have traditional backup-and-restore vulnerabilities but absolutely have data they don't want leaked. Healthcare companies, financial services, and consumer-facing tech firms are prime targets.
The group's sophistication in exploiting SSO and cloud services suggests members with legitimate enterprise IT experience. They understand how modern organizations structure their cloud infrastructure and know which services hold the most valuable data.
Company Response
Hims & Hers is offering 12 months of free credit monitoring to affected customers. The company also advised customers to:
- Monitor accounts for suspicious activity
- Be vigilant against phishing attempts that may use stolen contact information
- Consider placing fraud alerts with credit bureaus
The credit monitoring offering has become standard practice after data breaches, though its actual protective value is debatable. Attackers who obtain names, emails, and addresses typically use that information for phishing and social engineering rather than direct financial fraud.
Lessons for Healthcare Organizations
- Audit SSO access regularly - Know which applications connect through your identity provider and who has access to each
- Implement conditional access - Require additional verification for sensitive applications, even when SSO credentials are valid
- Segment customer data - Support platforms don't need access to clinical records
- Monitor third-party access logs - Unusual login patterns to SaaS platforms can indicate compromise before data leaves
- Prepare for vendor breaches - Incident response plans should include scenarios where the breach originates outside your infrastructure
For patients of telehealth services, the breach serves as a reminder that convenience comes with exposure. Every customer service interaction, every question about shipping or billing, becomes part of a data trail that may eventually leak. That's not a reason to avoid telehealth—the benefits often outweigh the risks—but it's worth being thoughtful about what information you share through support channels.
Related Articles
Crunchyroll Breach Exposes 6.8 Million Users via Malware
Hackers infected a contractor's device to steal Okta credentials, then pivoted to Crunchyroll's Zendesk. Support ticket data for 6.8 million subscribers extracted.
Mar 24, 2026Navia Benefit Solutions Breach Exposes 2.7 Million SSNs
Workplace benefits administrator Navia discloses data breach affecting 2.7 million individuals. Social Security numbers, health plan data, and personal information stolen during December-January intrusion.
Mar 23, 2026ShinyHunters Claims 1 Petabyte Theft from Telus Digital, Demands $65M
Canadian BPO giant confirms breach after ShinyHunters claims massive data theft including call recordings, source code, and FBI background checks. Ransom ignored.
Mar 17, 2026ShinyHunters Claims 400 Companies Breached via Salesforce Aura Flaw
Threat group ShinyHunters exploits misconfigured Salesforce Experience Cloud sites, stealing data from 100+ organizations including 921K records from Aura.com.
Mar 16, 2026