Security Experts:

Connect with us

Hi, what are you looking for?



Shutterfly Employee Data Compromised in Ransomware Attack

Photography and personalized products platform Shutterfly is notifying employees that some of their personal information was compromised in a ransomware attack in December 2021.

Photography and personalized products platform Shutterfly is notifying employees that some of their personal information was compromised in a ransomware attack in December 2021.

Shutterfly operates numerous services and brands – such as BorrowLenses, GrooveBook, Lifetouch, Shutterfly, Snapfish, Spoonflower, and Tiny Prints – and helps users create cards, home décor, invitations, gifts, and more.

In December 2021, the online retail and manufacturing platform told SecurityWeek that portions of its network were crippled in the ransomware attack, including manufacturing and corporate systems.

Now, the company is informing employees that, during the time they had access to its network, the attackers compromised certain types of personal information, including names and other employment-related data, according to a copy of the notification letter that Shutterfly submitted to the California Attorney General’s Office.

[ READ: Shutterfly Says Ransomware Attack Impacted Manufacturing ]

The online platform also says that the attackers had access to its network for roughly 10 days before the breach was discovered: from December 3 to December 13.

“An unauthorized third party gained access to our network. This was what is known as a ‘ransomware’ attack. The attacker both locked up some of our systems and accessed some of the data on those systems. This included access to personal information of certain people, including you,” Shutterfly says.

The company hasn’t named the ransomware involved in the incident, but the infamous Conti gang claimed responsibility for the attack in January.

On their leaks website on the Tor network, the group published roughly 7 gigabytes of data allegedly stolen from Shutterfly, including several archives that appear to contain employment agreements, financial and legal documents, payroll data, and more.

Related: Microsoft, Okta Confirm Data Breaches Involving Compromised Accounts

Related: Over 1 Million Impacted in Data Breach at Texas Dental Services Provider

Related: Cookware Distribution Giant Meyer Discloses Data Breach

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.


As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...