Potentially up to 40 million members
Rituals Cosmetics, an Amsterdam-based luxury cosmetics giant, has disclosed a significant data breach affecting members of its "My Rituals" loyalty program. The incident, discovered in April 2026, resulted in unauthorized access to and exfiltration of customer personal information. The compromised data includes full names, physical addresses, phone numbers, email addresses, and dates of birth. The company has stated that financial data and passwords were not affected. Rituals has notified the relevant authorities, including the Dutch Data Protection Authority, and is actively communicating with affected customers, warning them to be vigilant against follow-on phishing campaigns that could leverage the stolen data for social engineering.
On April 22, 2026, Rituals began sending email notifications to customers whose data was compromised. The breach exposed a significant amount of Personally Identifiable Information (PII) from the "My Rituals" loyalty program, which boasts over 40 million members globally. While the company has not disclosed the exact number of affected individuals, the notifications sent to customers across several European countries suggest a wide-ranging impact.
The attackers gained unauthorized access to a database containing customer information and downloaded the data. The specific attack vector has not been disclosed by the company. As of now, no ransomware or extortion group has claimed responsibility, and the data has not been observed for sale on known dark web marketplaces. However, the nature of the stolen data makes it highly valuable for identity theft, credential stuffing, and sophisticated phishing attacks.
While technical details of the intrusion are scarce, the incident can be classified as a data breach targeting customer PII. The attack likely involved exploiting a vulnerability in a web application, API, or database server that housed the "My Rituals" loyalty program data.
T1190 - Exploit Public-Facing Application (Likely vector)T1213 - Data from Information RepositoriesT1041 - Exfiltration Over C2 ChannelT1657 - Financial Impact (Indirectly, through reputational damage and regulatory fines)The immediate impact on Rituals Cosmetics includes significant reputational damage and potential regulatory fines under GDPR, given its base in the EU and the nature of the compromised data. The Dutch Data Protection Authority (Autoriteit Persoonsgegevens) will likely launch an investigation.
For the millions of affected customers, the risks are substantial:
The company's swift notification is a positive step, but the sheer volume of data and the sensitivity of the PII make this a high-severity incident for customers.
No Indicators of Compromise were mentioned in the source articles.
As this is a breach of a third-party company, direct hunting is not possible for end-users. However, organizations can hunt for secondary effects:
rituals-security.com, my-rituals.netFor Rituals Cosmetics, the response involved containing the intrusion, engaging third-party security experts, and notifying authorities and customers. This is a standard incident response playbook.
For affected customers and other organizations:
Train users to recognize and report phishing attempts that will likely follow this data breach.
Encrypting PII at rest can prevent it from being usable even if the database is compromised.
Mapped D3FEND Techniques:
Segment networks to isolate sensitive customer databases from less secure parts of the corporate network.
Mapped D3FEND Techniques:
For a consumer-facing platform like 'My Rituals,' implementing User Behavior Analysis (UBA) is crucial for detecting account takeover and data scraping. The system should establish a baseline of normal user activity, including login times, geographic locations, device fingerprints, and the rate of data access. Following this breach, attackers will use the stolen PII to attempt account takeovers. A UBA system could flag suspicious activity, such as a login from an unusual country immediately followed by an attempt to view or export all personal data. It could also detect automated scraping by monitoring the velocity of requests from a single IP or user session. Upon detecting an anomaly, the system can trigger a step-up authentication challenge (like an SMS code), temporarily lock the account, and alert the security team, preventing further data loss or fraudulent activity.
Given that the primary risk to customers is now phishing, Rituals should proactively implement phishing hardening measures. This includes registering common typosquatting domains and lookalike domains related to 'rituals' and 'myrituals' to prevent attackers from using them. They should also implement DMARC, DKIM, and SPF records with a strict p=reject policy to prevent email spoofing of their official domain. Furthermore, they should use their official communication channels (website, app notifications) to educate customers on how to identify official communications versus phishing attempts. For example, stating 'We will never ask for your password' and providing a dedicated, secure portal for all account-related actions, rather than using links in emails, can significantly reduce the success rate of follow-on phishing attacks that will inevitably target their customer base.
Rituals Cosmetics begins notifying affected customers via email about the data breach.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats