#WeeklyRoundup

Weekly Databreaches Roundup Week 06-2025

February 12, 2025
week06-2025

Here’s your weekly #databreach news roundup:

PoinCampus, IMI, Casio UK, Grubhub, and Ya-moon.

PoinCampus

Poincampus

IMI

British engineering firm IMI has disclosed a cybersecurity incident involving unauthorized access to its systems, just days after a similar breach at rival Smiths Group. IMI has engaged external cybersecurity experts to investigate and contain the attack while complying with regulatory obligations. The company has not confirmed whether data was stolen, but the U.K.’s Information Commissioner’s Office has received a data breach report and is assessing the situation.

Casio UK

casio

Casio UK’s e-shop was compromised between January 14-24, 2025, with malicious scripts stealing customer credit card and personal details. The breach, exploiting Magento vulnerabilities, was discovered by JSCrambler on January 28 and removed within 24 hours. Attackers used a skimmer to inject a fake checkout form, exfiltrating encrypted data to a Russian server. JSCrambler noted Casio UK’s weak Content Security Policy (CSP) allowed the attack. This follows prior security incidents, including an October 2024 ransomware attack exposing 8,500 individuals’ data and another breach affecting ClassPad users from 149 countries.

Grubhub

Grubhub

Grubhub disclosed a security breach caused by unauthorized access through a third-party service provider, exposing user contact details, partial payment card data for campus diners, and hashed passwords for legacy systems. The company terminated the provider’s access, partnered with forensic experts, and reinforced security measures, including credential rotations and enhanced monitoring. No full payment card numbers, bank details, or sensitive IDs were compromised. Users are advised to use unique passwords to minimize risk.

Ya-moon

A hacker named “Valerie” claims to have breached Ya-moon, a notorious South Korean pornography site linked to illegal content, exposing 326,000 user records. The leaked data includes usernames, IP addresses, plain-text passwords, chat logs, and private messages, potentially aiding law enforcement in identifying perpetrators. Despite previous failed attempts by authorities to dismantle the site, this breach could serve as a critical investigative tool. The exposure of South Korean-based user activity highlights security lapses within the platform and may lead to significant legal actions.

Discover more from Data Breach Insights

Subscribe now to keep reading and get access to the full archive.

Continue reading