Rituals Cosmetics Suffers Data Breach, Customer PII Exposed

Rituals Cosmetics Suffers Data Breach, Customer PII Exposed

Rituals Cosmetics, the Dutch beauty and home brand, has reported a data breach impacting its ‘My Rituals’ customer club. According to Cyber News - Erez Dasa, attackers successfully exfiltrated personal information from the loyalty program’s database.

The compromised data includes full names, email addresses, phone numbers, and dates of birth. While Rituals has not disclosed the vector, such breaches often stem from weak access controls, misconfigurations, or successful phishing campaigns targeting internal systems. The scope of affected customers remains unclear, but any loyalty program database is a high-value target for threat actors.

This incident underscores the persistent risk associated with collecting and storing extensive customer PII. For attackers, this data is a goldmine for subsequent phishing, social engineering, and identity theft campaigns. It’s not just about the immediate breach; it’s about the downstream impact on individuals who now face increased exposure.

What This Means For You

  • If you are a Rituals Cosmetics customer, assume your PII is compromised. Be highly vigilant for targeted phishing emails, SMS messages, or calls attempting to impersonate Rituals or other services. Enable multi-factor authentication everywhere, especially for financial accounts.

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

critical T1040 Collection

RITUALS Data Breach - Customer PII Exfiltration

Sigma YAML — free preview

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →
Take action on this incident
📡 Monitor rituals.com Free · 1 watchlist slot · instant alerts on new breaches 🔍 Threat intel on Rituals Cosmetics All breaches, IOCs & vendor exposure