Article Details

Scrape Timestamp (UTC): 2025-10-23 22:01:22.187

Source: https://www.theregister.com/2025/10/23/toysrus_canada_data_leak/

Original Article Text

Click to Toggle View

Playtime’s over: Crooks swipe Toys R Us Canada customer data and dump it online. What?! No complimentary credit monitoring?. The Canadian outpost of retailer Toys R Us on Thursday notified customers that attackers accessed a database, stole some of their personal information, then posted the data online. In a Thursday breach disclosure notice emailed to affected customers and shared on social media, the toy shop said it discovered the digital break-in on July 30, after the intruders claimed to have posted stolen customer data "on the unindexed internet." A subsequent investigation found that the records were indeed stolen, and that the thieves had copied people's names, addresses, phone numbers, and emails from the Toys R Us database. "We'd like to stress that no passwords, credit card details, or similar confidential data were involved in this incident," the company’s alert states. The notification doesn't explain when the compromise occurred, how long the miscreants had access to the Toys R Us network before swiping customer data, or whether they tried to extort the company before exposing the records online. Toys R Us did not respond to The Register's questions about the details in the email, nor how many people's details were stolen in the breach. We will update this story when we receive a response. In the disclosure sent to customers, Toys R Us said it hired third-party cybersecurity experts to contain and investigate the security SNAFU. It is also in the process of reporting the intrusion to privacy regulatory authorities. Businesses that leak customer data usually offer free digital identity and fraud monitoring services, because criminals can do all manner of mischief with the personal details stolen from Toys R Us' database, including identity fraud and impersonation - especially when combined with other personal details easily found on social media sites - as well as personalized phishing attacks, doxxing, and even physical stalking and harassment. However the toy retailer hasn’t offered such services to its customers. While the company didn't disclose who was responsible for the breach, a few notable data heists happened around the same timeframe in which Toys R Us says it spotted the stolen customer details online. Beginning in the summer, a campaign abusing OAuth tokens via Salesloft's Drift integration allowed attackers to access numerous companies' Salesforce instances and steal customer data. Cloudflare reported the attack hit "hundreds" of organizations. Additionally, CL0P-linked extortionists' recent raid on Oracle E-Business Suite (EBS) may have begun as early as July, according to Google, with the crims compromising "dozens" of organizations.

Daily Brief Summary

DATA BREACH // Toys R Us Canada Data Breach Exposes Customer Information Online

Toys R Us Canada notified customers of a data breach involving unauthorized access to their database, resulting in the theft and online posting of personal information.

The breach was detected on July 30, with attackers claiming to have posted the data on the unindexed internet, exposing names, addresses, phone numbers, and emails.

The company confirmed that no passwords or credit card details were compromised, limiting the scope of sensitive data exposure.

Toys R Us has engaged third-party cybersecurity experts to investigate and contain the breach and is reporting the incident to privacy regulatory authorities.

Despite the breach's potential for identity fraud and phishing attacks, the company has not offered complimentary credit monitoring or identity protection services to affected customers.

The breach's timing coincides with other significant data thefts, including attacks exploiting OAuth tokens and CL0P-linked extortion activities, though no direct connection has been confirmed.

The incident underscores the importance of robust data protection measures and timely customer support in mitigating the impact of data breaches.