Telehealth company Hims & Hers Health has notified customers of a data breach originating from a compromise of its third-party customer service platform, reported to be Zendesk. The incident, which took place between February 4 and February 7, 2026, was orchestrated by the notorious ShinyHunters extortion group. The attackers reportedly leveraged a compromised Okta single sign-on (SSO) account to gain access to the Zendesk instance, where they exfiltrated millions of customer support tickets. The compromised data includes customer names, email addresses, phone numbers, and other personal information contained within the support requests. Hims & Hers has confirmed that medical records were not part of this breach and is offering 12 months of credit monitoring to those affected.
This incident is a prime example of a supply chain attack targeting a SaaS provider to get to their customer's data.
The attack chain highlights the interconnected risks of modern cloud-based enterprise environments.
| Tactic | Technique ID | Name | Description |
|---|---|---|---|
| Initial Access | T1078 |
Valid Accounts | The attacker gained access using a compromised Okta SSO account. |
| Credential Access | T1606.002 |
SAML Evasion | Attackers may have manipulated SAML tokens from the compromised Okta session to gain access. |
| Collection | T1119 |
Automated Collection | The attackers likely used scripts to automatically download millions of support tickets from Zendesk. |
| Exfiltration | T1567.002 |
Exfiltration to Cloud Storage | ShinyHunters exfiltrated the data to their own infrastructure for extortion purposes. |
Hims & Hers breach now confirmed to expose highly sensitive PHI, significantly increasing severity. New details highlight ShinyHunters' advanced MFA bypass techniques.
Enforce phishing-resistant MFA on all SSO accounts to prevent compromised credentials from being used for access.
Implement comprehensive logging and auditing for both the identity provider (Okta) and the service provider (Zendesk) and correlate the logs to detect suspicious activity.
Apply the principle of least privilege within SaaS applications, limiting permissions for data export and other sensitive actions.
The Hims & Hers breach was predicated on a compromised Okta SSO account. The single most effective countermeasure would have been the enforcement of phishing-resistant Multi-Factor Authentication (MFA) on their Okta instance. While basic MFA (SMS, push notifications) is good, phishing-resistant methods like FIDO2/WebAuthn (e.g., YubiKeys) or certificate-based authentication would prevent an attacker from using stolen credentials, as they would not possess the required physical token or client-side certificate. Hims & Hers should immediately enforce this for all users, especially those with access to sensitive third-party applications like Zendesk. This shifts the security model from 'what you know' (a password) to 'what you have' (a physical key), effectively neutralizing the threat of credential theft via phishing or malware.
To detect this attack post-authentication, Hims & Hers should have employed a SaaS Security Posture Management (SSPM) or Cloud Access Security Broker (CASB) tool to perform Web Session Activity Analysis on their Zendesk instance. After gaining access, ShinyHunters' behavior would have been highly anomalous. A legitimate support agent's session involves handling tickets one by one. The attacker's session would have involved programmatic, high-volume data export operations. An analysis tool would baseline normal agent activity and immediately flag the attacker's session for: 1) Accessing/exporting millions of tickets, a massive deviation from the norm. 2) The session originating from a new or suspicious IP/geolocation. 3) The speed and automation of the actions. This would generate a high-confidence alert, allowing the security team to terminate the malicious session and suspend the compromised Okta account, limiting the scope of the data exfiltration.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats