CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Apr 11, 2026

Hims Breach Exposes the Most Sensitive Kinds of PHI

Dark Reading Archived Apr 11, 2026 ✓ Full text saved

Threat actors breached the telehealth brand, and now they may know who's bald, overweight, and impotent. What could they do with that information?

Full text archived locally
✦ AI Summary · Claude Sonnet


    CYBERATTACKS & DATA BREACHES CYBER RISK DATA PRIVACY СLOUD SECURITY NEWS Hims Breach Exposes the Most Sensitive Kinds of PHI Threat actors breached the telehealth brand, and now they may know who's bald, overweight, and impotent. What could they do with that information? Nate Nelson,Contributing Writer April 10, 2026 4 Min Read SOURCE: ZUMA PRESS, INC. VIA ALAMY STOCK PHOTO The telehealth company Hims & Hers Health, more commonly known as Hims, suffered a data breach via its third-party customer support platform. Due to the ultra-sensitive nature of some Hims products, customers could be at risk of some seriously embarrassing fallout. Have you called a customer support line any time since the COVID-19 pandemic ended and heard an automated voice message say, "We're experiencing a higher than normal call volume…" regardless of the day and time of your call? While organizations gradually have been replacing human customer service workers with bots and calling it "revolutionary," they've been taking an equally penny-pinching approach to securing their customer service stacks online. Cybercriminals have been targeting such platforms in recent years, and in the case of Hims, a threat actor gained access to customer support tickets that contained a potentially large amount of customers' uttermost sensitive personal health information (PHI). The infamous ShinyHunters group claimed responsibility for the attack, according to a BleepingComputer report last week, but those claims could not be verified. Related:Fraud Rockets Higher in Mobile-First Latin America "This isn't just a data breach — it’s a breakdown in the customer relationship," says Baker Johnson, chief business officer at UJET. "When someone reaches out for support, especially in healthcare, that’s a moment of trust. They reached out for help and instead had their trust compromised. That changes how they engage — and once that hesitation sets in, loyalty is already at risk." What Happened to Hims Customer Data? In a visibly self-refuting breach disclosure with the Vermont Attorney General's Office, Hims reported having first become aware of suspicious activity targeting its customer service platform on Feb. 5. The company said it "promptly took steps to secure" the affected service, but those steps didn't have such a prompt impact, as hackers maintained access from Feb. 4 to Feb. 7. In that time, "certain tickets" from customers seeking product support were nabbed by unauthorized actors. It took a month for the company to determine that those support tickets contained names and unspecified medical information belonging to "a limited set" of affected customers. (A company representative told Dark Reading's sister publication, Cybersecurity Dive, that email addresses were also impacted.) Another month later, the company began informing those affected customers. Hims did not say which third-party support platform it uses. Dark Reading reached out to Hims, but didn't get a response by the time of publication. Related:Automated Credential Harvesting Campaign Exploits React2Shell Flaw For Johnson, Hims is just the latest example of an industry-agnostic trend. "This is a design problem. Customer service is now one of the richest sources of personal data in the business, but it’s still managed across a patchwork of disconnected systems; recordings here, transcripts there, workflows somewhere else. That fragmentation is what creates risk," he says. Is Embarrassing PHI at Risk? As the old story goes, Hims is now offering impacted customers a year of free credit monitoring, and a few paragraphs worth of guidance about identity protection. The threat of identity theft, however, is hardly the only issue Hims customers now face. Between lascivious billboards and incessant podcast advertising, Hims has built its brand around the kinds of medical issues that people fear talking about the most: erectile dysfunction, balding, obesity, and mental health.  Not only does it specialize in the extra sensitive, but the company markets largely to younger demographics — men and women at times in their lives when these issues carry extra stigma. With that in mind, if attackers obtained anything beyond basic personally identifying information (PII) from Hims — and even with that alone, potentially — it could empower them to blackmail individuals to a level beyond what leaks of general PHI typically allow. Related:Not Toying Around: Hasbro Attack May Take 'Weeks' to Remediate Dark Reading could not find evidence that ShinyHunters or any cybercriminal group has leaked the Hims data yet, though the extortion group has a history of leaking stolen data when its victims don't pay up.  For organizations that manage lots of third-party software platforms, "The path forward is designing experiences where data doesn't sit scattered across systems in the first place, but where it moves securely, stays within trusted environments, and only exists as long as it's needed," UJET's Johnson says. "Because in the end, security isn't a feature of the experience. It's what makes the experience trustworthy." About the Author Nate Nelson Contributing Writer Nate Nelson is a journalist and scriptwriter. He writes for "Darknet Diaries" — the most popular podcast in cybersecurity — and co-created the former Top 20 tech podcast "Malicious Life." Before joining Dark Reading, he was a reporter at Threatpost. Want more Dark Reading stories in your Google search results? ADD US NOW More Insights Industry Reports AI SOC for MDR: The Structural Evolution of Managed Detection and Response How Enterprises Are Developing Secure Applications Frost Radar™: Non-human Identity Solutions 2026 CISO AI Risk Report Gartner IGA Voice of the Customer 2026 Access More Research Webinars Tips for Managing Cloud Security in a Hybrid Environment? Zero Trust Architecture for Cloud environments: Implementation Roadmap Security in the AI Age Identity Maturity Under Pressure: 2026 Findings and How to Catch Up Building a Robust SOC in a Post-AI World More Webinars You May Also Like CYBERATTACKS & DATA BREACHES CodeRED Emergency Alert Platform Shut Down Following Cyberattack by Rob Wright DEC 01, 2025 CYBERATTACKS & DATA BREACHES Jaguar Land Rover Shows Cyberattacks Mean (Bad) Business by Robert Lemos, Contributing Writer OCT 03, 2025 CYBERATTACKS & DATA BREACHES Chinese APT Drops 'Brickstorm' Backdoors on Edge Devices by Jai Vijayan, Contributing Writer SEP 25, 2025 CYBERATTACKS & DATA BREACHES DeepSeek Breach Opens Floodgates to Dark Web by Emma Zaballos APR 22, 2025 Editor's Choice CYBERSECURITY OPERATIONS RSAC 2026: AI Dominates, But Community Remains Key to Security byKristina Beek,Rob Wright APR 2, 2026 THREAT INTELLIGENCE Axios Attack Shows How Complex Social Engineering Is Industrialized byAlexander Culafi APR 6, 2026 5 MIN READ ICS/OT SECURITY Iranian Threat Actors Disrupt US Critical Infrastructure via Exposed PLCs byElizabeth Montalbano APR 8, 2026 4 MIN READ Want more Dark Reading stories in your Google search results? 2026 Security Trends & Outlooks THREAT INTELLIGENCE Cybersecurity Predictions for 2026: Navigating the Future of Digital Threats JAN 2, 2026 CYBER RISK Navigating Privacy and Cybersecurity Laws in 2026 Will Prove Difficult JAN 12, 2026 ENDPOINT SECURITY CISOs Face a Tighter Insurance Market in 2026 JAN 5, 2026 THREAT INTELLIGENCE 2026: The Year Agentic AI Becomes the Attack-Surface Poster Child JAN 30, 2026 Download the Collection Loading... Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. SUBSCRIBE Webinars Tips for Managing Cloud Security in a Hybrid Environment? THURS, MAY 7, 2026 AT 1PM EST Zero Trust Architecture for Cloud environments: Implementation Roadmap TUES, MAY 12, 2026 AT 1PM EST Security in the AI Age TUES, APRIL 28, 2026 AT 1PM EST Identity Maturity Under Pressure: 2026 Findings and How to Catch Up WED, MAY 6,2026 AT 1PM EST Building a Robust SOC in a Post-AI World THURS, MARCH 19, 2026 AT 1PM EST More Webinars White Papers How Sunrun Transformed Security Operations with AiStrike Autonomous Pentesting at Machine Speed, Without False Positives Fixing Organizations' Identity Security Posture Best practices for incident response planning Industry Report: AI, SOC, and Modernizing Cybersecurity Explore More White Papers BLACK HAT ASIA | MARINA BAY SANDS, SINGAPORE Experience cutting-edge cybersecurity insights in this four-day event featuring expert Briefings on the latest research, Arsenal tool demos, a vibrant Business Hall, networking opportunities, and more. Use code DARKREADING for a Free Business Pass or $200 off a Briefings Pass. GET YOUR PASS GISEC GLOBAL 2026 GISEC GLOBAL is the most influential and the largest cybersecurity gathering in the Middle East & Africa, uniting global CISOs, government leaders, technology buyers, and ethical hackers for three power-packed days of innovation, strategy, and live cyber drills. 📌 BOOK YOUR SPACE
    💬 Team Notes
    Article Info
    Source
    Dark Reading
    Category
    ◇ Industry News & Leadership
    Published
    Apr 11, 2026
    Archived
    Apr 11, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗