The national class action law firm Edelson Lechtzin LLP has initiated an investigation into a data breach at the telehealth and online pharmacy company, Hims & Hers, Inc.. The breach was not a direct compromise of Hims & Hers' systems, but rather a security incident at one of its key third-party vendors, Zendesk, which provides its customer service platform. According to a filing with the California Attorney General, an unauthorized party accessed customer service tickets within the Zendesk platform between February 4 and 7, 2026. These tickets contained sensitive personal data provided by customers during support interactions. The incident has prompted a potential class action lawsuit and serves as a stark reminder of the pervasive nature of supply chain risk in the digital ecosystem.
This incident is a classic example of a third-party or supply chain breach. The attack vector targeted Zendesk, a trusted partner of Hims & Hers. An unauthorized user gained access to the Zendesk environment used by Hims & Hers, although the method of this access (e.g., compromised credentials, vulnerability) is not specified.
Between February 4 and February 7, 2026, the attacker had access to customer service tickets. These tickets, by their nature, can contain a wide array of sensitive information that customers share when seeking support, including:
Upon discovering suspicious activity on February 5, Hims & Hers launched an investigation and confirmed the breach. The incident highlights how a company's data security posture is inextricably linked to the security of its vendors.
The core TTP at play is the exploitation of a trusted relationship.
T1199 - Trusted Relationship. The attackers compromised a third-party vendor (Zendesk) to gain indirect access to the data of the target organization (Hims & Hers).T1530 - Data from Cloud Storage Object. The attacker accessed and likely exfiltrated data stored in the form of customer support tickets within the SaaS platform.For Hims & Hers, the impact is multi-faceted. There is significant reputational damage, as customers entrusted the company with sensitive health-related information. The breach erodes that trust, regardless of whether the fault lies with Hims & Hers or Zendesk. The company now faces a potential class action lawsuit, which carries substantial legal and financial costs. Furthermore, they will face costs associated with incident response, regulatory notifications, and potentially fines under data privacy laws like CCPA. For the affected customers, the exposure of their personal information puts them at an increased risk of identity theft, fraud, and targeted phishing attacks.
Detecting a breach at a third-party vendor is notoriously difficult and often relies on disclosure from the vendor itself.
Mitigating third-party risk requires a programmatic approach to vendor management.
New details emerge on Hims & Hers breach, identifying ShinyHunters as the threat actor and a compromised Okta SSO account as the initial access vector.
Enforce MFA for access to all third-party SaaS platforms to prevent credential-based takeovers.
Regularly audit and monitor logs from critical third-party applications for signs of anomalous activity.
Implement a robust third-party risk management program that includes regular security reviews and enforces the principle of least privilege for vendor access.
The unauthorized access to the Zendesk platform begins.
Hims & Hers discovers suspicious activity on its network.
The unauthorized access to the Zendesk platform ends.
Edelson Lechtzin LLP announces its investigation into the data breach.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.