Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Uniqlo Mishandles Customer Data, Exposes It to Unauthorized Contractors
Newsletter
Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Uniqlo Mishandles Customer Data, Exposes It to Unauthorized Contractors
Newsletter
Search
  • Latest Stories
  • Security & Tech
    • Security
    • Vulnerabilities
    • Dark Web
    • Technology
    • Privacy
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
© MRS Media Company. Hackerdose LLC. All Rights Reserved.

Security » Uniqlo Mishandles Customer Data, Exposes It to Unauthorized Contractors

Security

Uniqlo Mishandles Customer Data, Exposes It to Unauthorized Contractors

Uniqlo has accidentally exposed its customer data to unauthorized contractors and partners due to an internal system error.

Marco Rizal
Last updated: August 21, 2024 10:12 am
By Marco Rizal - Editor, Journalist 4 Min Read
Share
Uniqlo Mishandles Customer Data Exposes It to Unauthorized Contractors
SHARE

Fast Retailing Co., Ltd., the parent company of Uniqlo, has revealed issues in its management of customer data, leading to unauthorized access by contractors who were not authorized to have this information.

After conducting an investigation, the company's internal department discovered that some employees and contractors had access to personal information that exceeded what was required for their work.

The company revealed on July 2nd that the error was due to a setting in its information system that was not sufficient to properly monitor the services provided to customers.

The system stored personal information between June 2023 and January 2024, which was not intended.

The company assured that no personal information was compromised or accessed by unauthorized individuals, as access was restricted to authorized employees and contractors only.

Fast Retailing's announcement provides a clear explanation of the incident, including its background, the steps taken to address it, and the measures planned for the future to prevent similar incidents

Uniqlo Message
Official statement from Fast Retailing Co., Ltd

In January 2024, the company's information system department made an unsettling discovery – personal information was being accessed by unauthorized individuals.

“We quickly took action by blocking access to the system and putting in place a mechanism to detect and isolate data that contains personal information.” The company stated.

Scope of the exposed data

The company discovered that personal data had been stored in the system as a result of a configuration error, which granted unauthorized access to certain contractors.

Although the system had strict access protocols in place to prevent unauthorized access, an error occurred that allowed certain contractors to view data they were not authorized to handle.

The company obtained written confirmations from these contractors, ensuring that no data was stored or removed. The company has clarified that this problem only impacted customers who met certain conditions, and not all customers.

Here is the personal information that was compromised during the breach, affecting customers who used Fast Retailing's services from June 2023 to January 2024:

  • Online Store Members: Names, addresses, telephone numbers, and email addresses of customers who used the Group's online stores.
  • Store Visitors: Names, telephone numbers, and email addresses of customers who visited Group stores and requested products from other locations.
  • Style Hint App Users: Email addresses of users of the “Style Hint” outfit discovery app.

Thankfully, the exposed information did not include credit card details or online store passwords.

Company's Response

Fast Retailing will reach out to impacted customers through email or postal mail, using the contact information they have on record.

This notification will give you a clear and concise explanation of the incident and its possible consequences.

The company stated that the incident occurred due to a lack of thorough specification checks during the development stage of the information system and insufficient monitoring during operation.

Fast Retailing will update its procedures to restrict access to personal information that is not necessary for business purposes, in order to prevent future incidents.

The company expressed regret for the delay in announcing the breach, which was first detected in January 2024.

Fast Retailing decided to conduct a comprehensive investigation to prevent the dissemination of unclear or incorrect information that could lead to confusion.

Although the investigation is still in progress, the company believed it had gathered enough information to share with the public in a clear and thorough manner.

More Stories

One Less Scanner? Norton Antivirus Jumps on Avast’s Engine

Massive Ransomware Campaign Hits Over 110,000 Domains via Exposed ENV Files

Hackers Pose as Israeli Government and Companies to Deploy Malware

Michigan County Restores 911 CAD System After Cyberattack

Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Subscribe to our newsletter

Receive the latest news and stories straight to your inbox.

Latest stories

Bitcoin Holds at $85K as Global Trade Tensions and Fed Speculation Unfold

April 15, 2025

Michael Saylor Doubles Down on Bitcoin (BTC) with $285M Investment Amid Global Uncertainty

April 14, 2025

Mantra Faces Crisis After OM Token Crashes 90% in a Day

April 14, 2025

Solana (SOL) on the Verge of a Breakout: Could $300 Be the Next Target?

April 14, 2025

You might also like

Malicious Microsoft Word Documents Exploiting CrowdStrike BSOD Bug to Spread Malware

Malicious Microsoft Word Documents Exploiting CrowdStrike Bug to Spread Malware

Federal Reserve Lockbit

LockBit Ransomware Group Claims Attack on U.S. Federal Reserve

Turkeys Massive Data Breach Confirmed With a Shrug From Officials

Turkey’s Massive Data Breach Confirmed With a Shrug From Officials

Chinese Health Apps Might Expose Your Genome Data 120 Million Users at Risk

Chinese Health Apps Might Expose Your Genome Data; 120 Million Users at Risk

Newsletter

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site

Quick Links

  • Contact Us
  • Search
  • Malware
  • Downloads

Company

  • About Us
  • Terms and Conditions
  • Cookies Policy
  • Privacy Policy
Advertise with us

Socials

Follow Us

© 2025 | HackerDose Media Company – All Rights Reserved

Welcome Back!

Sign in to your account

Lost your password?