35,000 customers in Verisure breach
Several prominent companies in the retail and service sectors have recently disclosed separate data security incidents, highlighting the diverse and persistent threats facing organizations that handle customer data. The victims include Toys "R" Us Canada, which suffered a data leak; Japanese e-commerce giant Askul, which was crippled by a ransomware attack; and Swedish security firm Verisure, which experienced a third-party data breach. These incidents have resulted in the exposure of customer Personally Identifiable Information (PII), significant operational disruptions, and potential financial theft, underscoring the broad impact of cyberattacks on businesses and their customers.
This series of unrelated incidents demonstrates multiple attack vectors targeting consumer-facing businesses:
Toys "R" Us Canada (Data Leak): Customer records were discovered on the dark web. The exposed data includes names, physical addresses, email addresses, and phone numbers. The initial access vector and threat actor remain unknown. Financial data was reportedly not compromised.
Askul (Ransomware Attack): The major Japanese retailer was hit by a ransomware attack that caused a complete shutdown of its e-commerce operations. The attack disrupted systems for online orders, user registrations, and shipments, also affecting logistics for partners like Muji and Loft. Askul has warned that customer and personal data may have been exfiltrated as part of the attack (T1486 - Data Encrypted for Impact).
Verisure / Alert Alarm (Supply Chain Attack): The Swedish security company confirmed a breach impacting its subsidiary, Alert Alarm. An attack on an external billing partner led to unauthorized access to the data of approximately 35,000 customers. This is a classic supply chain attack (T1656 - Supply Chain Compromise), where a less secure vendor provides an entry point to a larger organization's data. Exposed data includes names, addresses, emails, and Swedish social security numbers.
Jewett-Cameron Trading (Cyber-Attack): This Oregon-based company reported an incident involving the theft of non-public financial documents and IT information.
RansomHouse claims 1.1TB data theft from Askul, confirming earlier suspected data leak. Askul acknowledges breach and warns customers of potential fraud.
Regularly scanning for and remediating vulnerabilities can prevent initial access for ransomware and other attacks.
Proper network segmentation can contain a ransomware attack, as seen with Askul, preventing it from spreading throughout the entire enterprise.
The Verisure data breach, originating from an external billing partner, is a stark reminder of supply chain risk. To prevent such incidents, organizations must implement robust Vendor Asset Management. This goes beyond a simple questionnaire. It involves creating a comprehensive inventory of all third-party vendors, the data they access, and the systems they connect to. For critical vendors like a billing partner, mandate security requirements in contracts, including the right to audit, specific security controls (e.g., MFA, encryption), and strict breach notification timelines (e.g., within 24 hours). Utilize third-party risk management platforms to continuously monitor the security posture of your vendors, treating their environment as an extension of your own.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.