35,000 customers in Verisure breach
Several prominent companies in the retail and service sectors have recently disclosed separate data security incidents, highlighting the diverse and persistent threats facing organizations that handle customer data. The victims include Toys "R" Us Canada, which suffered a data leak; Japanese e-commerce giant Askul, which was crippled by a ransomware attack; and Swedish security firm Verisure, which experienced a third-party data breach. These incidents have resulted in the exposure of customer Personally Identifiable Information (PII), significant operational disruptions, and potential financial theft, underscoring the broad impact of cyberattacks on businesses and their customers.
This series of unrelated incidents demonstrates multiple attack vectors targeting consumer-facing businesses:
Toys "R" Us Canada (Data Leak): Customer records were discovered on the dark web. The exposed data includes names, physical addresses, email addresses, and phone numbers. The initial access vector and threat actor remain unknown. Financial data was reportedly not compromised.
Askul (Ransomware Attack): The major Japanese retailer was hit by a ransomware attack that caused a complete shutdown of its e-commerce operations. The attack disrupted systems for online orders, user registrations, and shipments, also affecting logistics for partners like Muji and Loft. Askul has warned that customer and personal data may have been exfiltrated as part of the attack (T1486 - Data Encrypted for Impact).
Verisure / Alert Alarm (Supply Chain Attack): The Swedish security company confirmed a breach impacting its subsidiary, Alert Alarm. An attack on an external billing partner led to unauthorized access to the data of approximately 35,000 customers. This is a classic supply chain attack (T1656 - Supply Chain Compromise), where a less secure vendor provides an entry point to a larger organization's data. Exposed data includes names, addresses, emails, and Swedish social security numbers.
Jewett-Cameron Trading (Cyber-Attack): This Oregon-based company reported an incident involving the theft of non-public financial documents and IT information.
Regularly scanning for and remediating vulnerabilities can prevent initial access for ransomware and other attacks.
Proper network segmentation can contain a ransomware attack, as seen with Askul, preventing it from spreading throughout the entire enterprise.
The Verisure data breach, originating from an external billing partner, is a stark reminder of supply chain risk. To prevent such incidents, organizations must implement robust Vendor Asset Management. This goes beyond a simple questionnaire. It involves creating a comprehensive inventory of all third-party vendors, the data they access, and the systems they connect to. For critical vendors like a billing partner, mandate security requirements in contracts, including the right to audit, specific security controls (e.g., MFA, encryption), and strict breach notification timelines (e.g., within 24 hours). Utilize third-party risk management platforms to continuously monitor the security posture of your vendors, treating their environment as an extension of your own.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats