Netcrook Logo
👤 SECPULSE
🗓️ 12 Apr 2026   🗂️ Cyber Warfare     🌍 Europe

ShinyHunters Threaten to Spill Secrets: Mytheresa Faces Ransomware Ultimatum

Luxury fashion retailer Mytheresa is under siege as notorious cyber gang ShinyHunters claims to have breached customer data and demands a ransom.

In the ever-escalating cyber extortion wars, a new high-profile victim has emerged. German luxury e-commerce giant Mytheresa finds itself in the crosshairs of the infamous ShinyHunters group, who allege they have stolen sensitive customer information and transactional records. With a chilling deadline and a threat to unleash chaos, the attackers are demanding payment - or else, Mytheresa risks becoming the next headline-grabbing casualty in the ransomware epidemic.

Fast Facts

  • On April 11, 2026, ShinyHunters claimed responsibility for hacking Mytheresa.
  • Compromised data includes sensitive customer PII and transactional histories.
  • The attackers issued a final warning: pay by April 14 or face a public leak.
  • Mytheresa operates globally, serving a high-end clientele susceptible to targeted fraud.
  • Ransomfeed reports no direct access to stolen data, only public ransom notes.

The attack, first flagged by ransomware trackers on April 12, 2026, appears to have struck just a day earlier. ShinyHunters - well-known in cybercrime circles for targeting major brands - boast of exfiltrating “sensitive customer PII data and transactional history.” In plain terms, this means names, addresses, contact details, and potentially even purchase records of Mytheresa’s luxury-loving customer base could now be in criminal hands.

ShinyHunters’ message is blunt: pay up or we leak everything. The group’s post, laced with veiled threats of “annoying digital problems,” gives Mytheresa until April 14 to comply. After that, they promise to dump the data online, exposing clients to identity theft, phishing, and reputational damage. For a retailer catering to the world’s elite, the stakes could not be higher.

This incident is part of a wider trend: ransomware gangs increasingly target companies with valuable personal data, knowing the fallout from a breach can be catastrophic. ShinyHunters themselves have a notorious history, having previously attacked tech firms, retailers, and even educational institutions. Their modus operandi? Steal, threaten, and extort - then publish leaked data to prove a point if demands aren’t met.

Legal and cybersecurity experts warn that paying a ransom is no guarantee of safety. Not only does it embolden attackers, but leaked data often resurfaces on underground forums despite payment. Meanwhile, platforms like ransomware.live provide a window into these incidents by indexing public ransom notes - without distributing any stolen data. Their mission: keep the public informed and help organizations bolster their defenses.

With the deadline looming, Mytheresa faces a harrowing decision: negotiate with criminals or brace for a damaging data leak. As cyber blackmail becomes a grim normality, one thing is clear - no brand, no matter how luxurious, is immune from the digital underworld’s reach.

WIKICROOK

  • Ransomware: Ransomware is malicious software that encrypts or locks data, demanding payment from victims to restore access to their files or systems.
  • PII (Personally Identifiable Information): PII is any information that can identify a person, like a name, address, or social security number, and must be protected to ensure privacy.
  • Exfiltration: Exfiltration is the unauthorized transfer of sensitive data from a victim’s network to an external system controlled by attackers.
  • Phishing: Phishing is a cybercrime where attackers send fake messages to trick users into revealing sensitive data or clicking malicious links.
  • Ransom Note: A ransom note is a message from cybercriminals demanding payment to unlock or restore access to encrypted or compromised data after a ransomware attack.
Mytheresa ShinyHunters ransomware

SECPULSE SECPULSE
SOC Detection Lead
← Back to news