Data Breaches

Hims & Hers Health Breach Leaks Highly Sensitive Patient Health Information

April 10, 2026 20:45 · 5 min read
Hims & Hers Health Breach Leaks Highly Sensitive Patient Health Information

A Telehealth Brand With a Uniquely Sensitive Exposure Problem

Hims & Hers Health — widely known simply as Hims — has confirmed a data breach affecting its third-party customer support platform. The incident is particularly alarming given the nature of the company's products, which center on some of the most stigmatized medical conditions people face: erectile dysfunction, hair loss, obesity, and mental health disorders. For the customers caught up in this breach, the fallout could extend well beyond the typical identity theft risk.

The notorious cybercriminal group ShinyHunters claimed responsibility for the attack, according to a report published last week by BleepingComputer, though those claims have not been independently verified.

What the Breach Actually Exposed

According to Hims' disclosure filed with the Vermont Attorney General's Office, the company first detected suspicious activity targeting its customer service platform on February 5. However, unauthorized actors had already gained access beginning February 4, and maintained that access through February 7 — a three-day window during which they were able to access customer support tickets.

The company stated it "promptly took steps to secure" the affected platform, a claim that sits awkwardly alongside the fact that hackers remained inside the system for the duration of that period. The tickets accessed contained names, unspecified medical information, and — according to a company representative who spoke with Cybersecurity Dive, Dark Reading's sister publication — email addresses belonging to a "limited set" of affected customers.

It then took Hims approximately one month to determine that protected health information (PHI) was present within those tickets, and another month after that before the company began notifying affected individuals. Hims did not disclose which third-party customer support platform was involved. Dark Reading reached out to Hims for comment but did not receive a response before publication.

Why This Breach Is More Dangerous Than Most

While Hims is now offering impacted customers a standard one-year subscription to free credit monitoring — a near-universal corporate response to data breaches — the risk profile of this incident is anything but standard.

The company has built its brand, through billboard advertising and heavy podcast sponsorships, on medical issues that carry significant social stigma. Its customer base skews younger, comprising men and women at life stages when conditions like erectile dysfunction, balding, and weight gain may feel especially sensitive. If attackers obtained any PHI beyond basic personally identifying information from the customer support tickets, that data could enable a level of blackmail and targeted extortion that goes far beyond what most healthcare data breaches allow.

As of the time of publication, Dark Reading found no evidence that ShinyHunters or any other threat actor had publicly leaked the stolen Hims data. The group, however, has an established history of releasing stolen information when victims refuse to pay ransom demands.

Third-Party Customer Support Platforms: A Growing Attack Surface

Baker Johnson, chief business officer at UJET, framed the Hims incident as part of a broader, industry-wide failure in how organizations manage customer service data.

"This isn't just a data breach — it's a breakdown in the customer relationship. When someone reaches out for support, especially in healthcare, that's a moment of trust. They reached out for help and instead had their trust compromised. That changes how they engage — and once that hesitation sets in, loyalty is already at risk."

Johnson also pointed to a structural issue underlying incidents like this one. "This is a design problem," he said. "Customer service is now one of the richest sources of personal data in the business, but it's still managed across a patchwork of disconnected systems; recordings here, transcripts there, workflows somewhere else. That fragmentation is what creates risk."

Cybercriminals have increasingly targeted third-party customer support platforms in recent years. As many organizations have shifted away from human customer service agents — often billing the transition to automated systems as innovative — security investment in those same platforms has not kept pace. The result is a category of infrastructure that holds enormous quantities of sensitive data but frequently lacks the protections applied to core enterprise systems.

The Path Forward for Organizations Handling Sensitive Data

For businesses managing large volumes of third-party software and customer service infrastructure, Johnson offered a pointed recommendation: rethink how data flows through and between those systems in the first place.

"The path forward is designing experiences where data doesn't sit scattered across systems in the first place, but where it moves securely, stays within trusted environments, and only exists as long as it's needed. Because in the end, security isn't a feature of the experience. It's what makes the experience trustworthy."

That philosophy — data minimization combined with secure-by-design architecture — is especially relevant in healthcare-adjacent industries where the consequences of exposure stretch far beyond financial harm. In the case of Hims, what was stored inside a customer support ticket was never just a transaction record. It was a private moment of vulnerability that a customer trusted a company to protect.

Key Facts at a Glance


Source: Dark Reading

Source: Dark Reading

Powered by ZeroBot

Protect your website from bots, scrapers, and automated threats.

Try ZeroBot Free