Canada Goose Investigating Leak of 600,000 Customer Records

Related

Lotus Blossom Hackers Compromised Notepad++ Hosting Infrastructure to Deliver Malware

What happened The state-sponsored threat group Lotus Blossom breached the...

Lithuania Launches National Initiative to Counter AI-Driven Cyber Fraud

What happened Lithuania has launched a government-funded national initiative aimed...

ClickFix Attack Abuses nslookup to Deliver PowerShell Malware via DNS

What happened Threat actors have introduced a new ClickFix attack...

Snail Mail Phishing Campaign Targets Trezor and Ledger Crypto Wallet Users

What happened Threat actors have launched a phishing campaign using...

Share

What happened

Hackers linked to the ShinyHunters data extortion group have claimed responsibility for leaking more than 600,000 customer records belonging to Canada Goose. The group published a 1.67 GB dataset on its leak site containing detailed e-commerce order records, including customer names, email addresses, phone numbers, billing and shipping addresses, IP addresses, and order histories. The dataset also included partial payment card information such as card brand and truncated card numbers, along with payment authorization metadata. 

Canada Goose stated that the data appears to relate to historical customer transactions and said it has found no evidence that its own systems were breached. The company is reviewing the dataset to determine its scope and origin, while attackers claimed the data may have come from a third-party payment processor breach dating back to August 2025. 

Who is affected

Customers of Canada Goose whose transaction data was included in the leaked dataset are affected, as exposed records contain personal details, order histories, and partial payment card information associated with past purchases. 

Why CISOs should care

The exposure of historical transaction data through a suspected third-party service highlights ongoing risks in e-commerce ecosystems where payment processors and service providers store sensitive customer and transactional information. 

3 practical actions

  • Investigate third-party data exposure. Review integrations with payment processors and external vendors that handle customer transaction data.
  • Monitor leaked datasets. Analyze published records to determine whether customer or enterprise data was included.
  • Strengthen vendor security oversight. Ensure service providers implement appropriate controls to protect customer transaction information.