Woflow Breach: 447K Records - Emails & Addresses Exposed (2026)
In March 2026, the AI-driven merchant data platform Woflow was named as a victim by the ShinyHunters data extortion group . The group subsequently published tens of thousands of files allegedly obtained from the company, comprising more than 2TB of data. The trove included hundreds of thousands of e...
Overview
In March 2026, the AI-driven merchant data platform Woflow was targeted by the ShinyHunters data extortion group, which published tens of thousands of files totaling over 2TB of data. The leak exposed 447,593 records containing personally identifiable information (PII) such as email addresses, names, phone numbers, and physical addresses. The data appears to include both Woflow customers and, critically, the customers of merchants using Woflow’s platform. This breach was reported to Have I Been Pwned, allowing users to verify if their information was compromised.
What Was Exposed
The exposed data includes:
- Email Addresses: 447,593 unique email accounts, usable for phishing and credential stuffing attacks.
- Names: Full names associated with each record, enabling targeted social engineering.
- Phone Numbers: Direct contact lines, increasing risks of SMS-based scams (smishing).
- Physical Addresses: Street-level addresses, which could facilitate identity theft or physical threats.
No financial data or passwords were explicitly mentioned, but the combination of personal identifiers is enough for criminals to build detailed profiles.
Potential Impact
The severity is HIGH due to the sensitivity of exposed data combined with the scale. The immediate risks include:
- Phishing & Smishing: Attackers can use email addresses and phone numbers to send fraudulent messages impersonating Woflow or its merchant partners, tricking victims into revealing passwords or payment details.
- Identity Theft: Names and addresses are foundational for opening fraudulent accounts, applying for credit, or filing false tax returns.
- Physical Security: For high-profile individuals, leaked addresses can lead to stalking, harassment, or doxxing.
- Business Email Compromise (BEC): Breach data can be used to target employees of merchant companies, potentially leading to financial fraud.
Because Woflow processes data for merchants, the ripple effect means customers of restaurants, retail chains, and other businesses using Woflow’s platform are also at risk.
Recommendations
If you suspect your data was exposed, take these steps immediately:
- Check Have I Been Pwned: Visit haveibeenpwned.com to see if your email appears in this breach.
- Beware of Phishing: Treat unsolicited emails, texts, or calls claiming to be from Woflow or its merchants with extreme skepticism. Do not click links or provide personal info.
- Enable Multi-Factor Authentication (MFA): If you use email or accounts linked to the exposed addresses, enable MFA to block unauthorized access.
- Monitor Credit Reports: Check your credit reports at AnnualCreditReport.com for suspicious accounts opened in your name.
- Freeze Your Credit: Consider freezing your credit with Equifax, Experian, and TransUnion to prevent identity theft.
How to Check If You’re Affected
The easiest way is to visit Have I Been Pwned and enter your email address. If your email appears, your name, phone, and address are likely also exposed. For broader safety, check with any merchants you know use Woflow’s platform.
Security Insight
This breach underscores a critical supply chain vulnerability: companies like Woflow that aggregate merchant customer data create attractive targets, as a single breach can expose millions of end consumers indirectly. The involvement of ShinyHunters, a group known for extortion, suggests Woflow may have lacked adequate security monitoring to detect or prevent the initial intrusion. Unlike payment card breaches that trigger regulatory notification, this leak of basic PII often goes undetected by victims until it is used in targeted attacks, highlighting a gap in consumer protection laws. For ongoing threats, follow our cybersecurity news coverage.
Further Reading
Investigate Breaches Safely with NordVPN
Researching exposed data, paste sites, or threat actor infrastructure? Route your OSINT traffic through a VPN to avoid attribution and keep your investigation IP separate from your corporate network.
Get NordVPN for ResearchAffiliate link — we may earn a commission at no extra cost to you.
Never miss a data breach report
Get real-time security alerts delivered to your preferred platform.
Related Breach Reports
In April 2026, the ultra-luxury hotel brand Aman was named by ShinyHunters as the target of a "pay or leak" extortion campaign , with the data allegedly obtained from their Salesforce CRM. The data was subsequently leaked publicly and contained over 200k unique email addresses. Whilst not present on...
In April 2026, the hacking collective ShinyHunters claimed to have obtained data from Pitney Bowes as part of a broader extortion campaign that also named several other organisations. After negotiations allegedly failed, the group publicly released the data which included 8.2M unique email addresses...
In April 2026, online training company Udemy was the victim of a “pay or leak” extortion attempt perpetrated by the ShinyHunters group. The data was subsequently leaked publicly and contained 1.4M unique email addresses belonging to customers and instructors. The data also included names, physical a...
In March 2026, Hallmark suffered an alleged breach and subsequent extortion after attackers gained access to data stored within Salesforce. The data was later published after the extortion deadline passed, exposing 1.7M unique email addresses across both Hallmark and the Hallmark+ streaming service,...