Seiko USA website defaced as hacker claims customer data theft
Bleeping ComputerArchived Apr 20, 2026✓ Full text saved
The Seiko USA website was defaced over the weekend, displaying a message from attackers claiming they stole its Shopify customer database and threatening to leak it unless a ransom is paid. [...]
Full text archived locally
✦ AI Summary· Claude Sonnet
Seiko USA website defaced as hacker claims customer data theft
By Lawrence Abrams
April 20, 2026 02:22 PM 0
The Seiko USA website was defaced over the weekend, displaying a message from attackers claiming they stole its Shopify customer database and threatening to leak it unless a ransom is paid.
Visitors to the "Press Lounge" section of the site were shown a page titled "HACKED," which replaced normal content with what appeared to be a ransom demand and data breach notification.
The message warned that attackers had gained access to the company's Shopify backend and exfiltrated sensitive customer information.
"This is an urgent security notification regarding your Shopify store. Your customer database has been compromised," read the defaced webpage.
"We have successfully breached your Shopify store's security systems and downloaded the entire customer database."
Seiko website defaced to show extortion message
Source: BleepingComputer
The threat actors claim the stolen data contains the following information:
Customer Information: Names, email addresses, phone numbers
Order History: Purchase records, transaction details
Shipping Data: Addresses, shipping preferences
Account Details: Account creation dates, customer notes
The attackers warn that the stolen data will be publicly released unless Seiko USA enters into negotiations.
As part of the demand, they instructed the company to locate a specific customer account, identified as ID 8069776801871, within the Shopify admin panel. The threat actors say that a contact email address was added to that account profile and should be used to initiate negotiations.
The defacement further warned that Seiko USA had 72 hours to contact them or the alleged database would be published.
BleepingComputer has not been able to determine what threat actor is behind the attack and whether their claims are legitimate.
Seiko USA has not publicly confirmed or responded to BleepingComputer emails about the incident, but has since removed the extortion message from the website.
99% of What Mythos Found Is Still Unpatched.
AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.
At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what's exploitable, proves controls hold, and closes the remediation loop.
Claim Your Spot
Related Articles:
Vercel confirms breach as hackers claim to be selling stolen data
Crypto-exchange Kraken extorted by hackers after insider breach
Stolen Rockstar Games analytics data leaked by extortion gang
Snowflake customers hit in data theft attacks after SaaS integrator breach
Google: New UNC6783 hackers steal corporate Zendesk support tickets