Data Breaches Hit Toys 'R' Us Canada, Askul, and Verisure

Multiple Retail and Service Companies Disclose Data Breaches, Exposing Customer PII

HIGH
October 27, 2025
November 1, 2025
4m read
Data BreachRansomware

Impact Scope

People Affected

35,000 customers in Verisure breach

Affected Companies

Toys "R" Us CanadaAskulVerisureAlert AlarmJewett-Cameron Trading

Industries Affected

RetailManufacturing

Geographic Impact

CanadaJapanSwedenUnited States (global)

Related Entities(initial)

Other

Alert AlarmAskulJewett-Cameron TradingLoftMujiToys "R" Us CanadaVerisure

Full Report(when first published)

Executive Summary

Several prominent companies in the retail and service sectors have recently disclosed separate data security incidents, highlighting the diverse and persistent threats facing organizations that handle customer data. The victims include Toys "R" Us Canada, which suffered a data leak; Japanese e-commerce giant Askul, which was crippled by a ransomware attack; and Swedish security firm Verisure, which experienced a third-party data breach. These incidents have resulted in the exposure of customer Personally Identifiable Information (PII), significant operational disruptions, and potential financial theft, underscoring the broad impact of cyberattacks on businesses and their customers.


Threat Overview

This series of unrelated incidents demonstrates multiple attack vectors targeting consumer-facing businesses:

  • Toys "R" Us Canada (Data Leak): Customer records were discovered on the dark web. The exposed data includes names, physical addresses, email addresses, and phone numbers. The initial access vector and threat actor remain unknown. Financial data was reportedly not compromised.

  • Askul (Ransomware Attack): The major Japanese retailer was hit by a ransomware attack that caused a complete shutdown of its e-commerce operations. The attack disrupted systems for online orders, user registrations, and shipments, also affecting logistics for partners like Muji and Loft. Askul has warned that customer and personal data may have been exfiltrated as part of the attack (T1486 - Data Encrypted for Impact).

  • Verisure / Alert Alarm (Supply Chain Attack): The Swedish security company confirmed a breach impacting its subsidiary, Alert Alarm. An attack on an external billing partner led to unauthorized access to the data of approximately 35,000 customers. This is a classic supply chain attack (T1656 - Supply Chain Compromise), where a less secure vendor provides an entry point to a larger organization's data. Exposed data includes names, addresses, emails, and Swedish social security numbers.

  • Jewett-Cameron Trading (Cyber-Attack): This Oregon-based company reported an incident involving the theft of non-public financial documents and IT information.

Impact Assessment

  • PII Exposure: Thousands of customers across Canada, Japan, and Sweden have had their personal information, including highly sensitive data like social security numbers, exposed. This places them at high risk of identity theft and phishing attacks.
  • Operational Disruption: The ransomware attack on Askul demonstrates the crippling effect such incidents can have on business operations, leading to a complete halt in sales and significant revenue loss.
  • Reputational Damage: For all affected companies, particularly a security firm like Verisure, data breaches can severely damage customer trust and brand reputation.
  • Third-Party Risk: The Verisure incident highlights the critical importance of vetting and monitoring the security posture of all third-party vendors who have access to sensitive data.

Detection & Response

  • Dark Web Monitoring: For incidents like the Toys "R" Us leak, proactive dark web monitoring can provide early warning that company data is being traded or has been published. This aligns with Decoy Object (D3-DO) principles if decoy data is seeded.
  • Ransomware Detection: For the Askul incident, detection would rely on identifying ransomware precursors, such as lateral movement, credential dumping, or large-scale data exfiltration, before the final encryption stage.
  • Vendor Auditing: For the Verisure breach, detection relies on the vendor's own security monitoring and transparent communication. Organizations must have contractual obligations for timely breach notification from their partners.

Mitigation

  1. Vendor Risk Management: Implement a robust third-party risk management program. Vet the security of all vendors, include security clauses in contracts, and conduct regular audits. This is crucial for preventing supply chain attacks like the one affecting Verisure.
  2. Ransomware Defenses: Employ a defense-in-depth strategy against ransomware, including network segmentation, immutable backups, and strict access controls, to prevent incidents like the one at Askul.
  3. Data Minimization and Encryption: Store only the customer data that is absolutely necessary and encrypt sensitive data both at rest and in transit. This can limit the impact of a breach if one occurs.
  4. Incident Response Plan: Maintain and regularly test an incident response plan to ensure a swift and organized reaction to a breach, minimizing damage and facilitating recovery.

Timeline of Events

1
October 27, 2025
This article was published

Article Updates

November 1, 2025

Severity increased

RansomHouse claims 1.1TB data theft from Askul, confirming earlier suspected data leak. Askul acknowledges breach and warns customers of potential fraud.

Japanese retailer Askul has confirmed a major data breach, with the Russian-linked group RansomHouse claiming responsibility for stealing 1.1 terabytes of customer data, including names, emails, and purchase histories. This confirms the suspected data exfiltration mentioned previously. RansomHouse, known for data extortion rather than encryption, leaked samples on October 30. Askul is investigating and warning customers of potential fraud, escalating the incident's confirmed impact and attribution.

Sources & References(when first published)

27th October – Threat Intelligence Report
research.checkpoint.comOctober 27, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Data BreachPIIRansomwareRetailSupply Chain AttackVendor Breach

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading