Show summary Hide summary
Hims & Hers has disclosed a security breach that exposed customer support records after attackers accessed a third-party ticketing platform, raising fresh privacy concerns for users of online healthcare services. The company’s filing with California authorities and a narrow February intrusion window make the incident immediately relevant to patients who rely on telehealth providers for sensitive prescriptions and treatment.
The company says the intrusion occurred between February 4 and February 7, when unknown actors gained entry to the external customer service system that handles support requests. According to the breach notice submitted to the California attorney general, the intruders extracted numerous support tickets that contained information supplied by customers.
What Hims & Hers says
OpenAI CEO makes amends with Tumbler Ridge community after backlash
Walmart sales trend echoes past recessions: rising risk for consumers
A company spokesperson attributed the incident to social engineering, describing it as an attack that manipulated staff into granting access. Hims & Hers told regulators the files taken “primarily” included customer names and email addresses. The filing redacted additional details on the types of data removed, and the company declined to confirm whether it has received any extortion demands.
While Hims & Hers maintains that formal medical records were not accessed, experts warn that support-ticket systems can still hold sensitive account and health-related notes submitted by users during troubleshooting or verification.
- Incident window: February 4–7, per the company’s disclosure.
- Compromised system: a third-party customer service/ticketing platform.
- Data reportedly taken: customer names, email addresses; other items redacted in the notice.
- Legal context: California requires disclosure when 500 or more state residents are affected; the total number of impacted individuals is not yet public.
- Attack type: described by the company as social engineering rather than a direct technical breach of Hims & Hers’ internal systems.
Why this matters now
Customer support databases have become a frequent target because they often aggregate identifying details and case notes that can be repurposed for fraud, account takeover, or blackmail. Attacks on ticketing platforms offer a shortcut for criminals seeking large batches of customer information without breaching core patient records.
Security incidents of this kind can unfold in stages: initial access to a help-desk account, bulk export of tickets, and then potential misuse of the extracted data. Even when electronic medical records remain intact, leaked support conversations can reveal personal health concerns, medication names, or other context that users expected to remain private.
Broader trend and past precedents
In recent years, several companies outside the healthcare sector have reported similar intrusions into customer service systems. Such breaches have sometimes exposed highly sensitive documents — for example, scanned identity documents used for account verification — and have led to calls for stronger protections around third-party platforms that handle consumer inquiries.
For now, Hims & Hers’ filing is the primary public record of the event, and investigators are likely to focus on how the attackers gained access to the ticketing provider and what safeguards were in place to prevent mass extraction of data.
The incident underscores the broader risk posed by vendor ecosystems: organizations increasingly rely on outsourced tools to run customer operations, and those vendors can become points of vulnerability with real consequences for users’ privacy and trust.












