Warner Music Group last week started informing customers of its e-commerce websites that their personal information may have been compromised as a result of a data breach suffered by an external service provider.
In a data breach notification submitted to the California Attorney General, the music company said it learned of the breach on August 5, but the hackers had access to the impacted websites since April 25, 2020. It’s unclear exactly which sites were hacked, but the company said it was “a number of US-based e-commerce websites” that it operates.
The attackers may have copied information provided by users on the affected e-commerce websites, including name, email address, phone number, billing and shipping address, and payment card details such as card number, expiration date and CVV. Payments made via PayPal are not impacted.
Based on Warner Music’s limited description of the incident, this appears to be a Magecart-style attack, where cybercriminals compromise e-commerce websites or service providers and plant skimmer malware that harvests personal and financial information when customers make a purchase.
“While we cannot definitively confirm that your personal information was affected, it is possible that it might have been as your transaction(s) occurred during the period of compromise. If it was, this might have exposed you to a risk of fraudulent transactions being carried out using your details,” Warner Music wrote in a letter sent to potentially impacted customers.
Warner Music says it has launched an investigation into the incident and it has notified both law enforcement and the issuers of the compromised credit cards. The company is offering affected customers 12 months of free identity monitoring services through Kroll.
Related: Magecart Hackers Continue Improving Skimmers
Related: Magecart Group Hits 570 Websites in Three Years
Related: Magecart Attacks on Claire’s and Other U.S. Stores Linked to North Korea
Related: Website of Gunmaker Smith & Wesson Hacked in Magecart Attack

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- UK Car Retailer Arnold Clark Hit by Ransomware
- EV Charging Management System Vulnerabilities Allow Disruption, Energy Theft
- Unpatched Econolite Traffic Controller Vulnerabilities Allow Remote Hacking
- Google Fi Data Breach Reportedly Led to SIM Swapping
- Microsoft’s Verified Publisher Status Abused in Email Theft Campaign
- British Retailer JD Sports Discloses Data Breach Affecting 10 Million Customers
- Meta Awards $27,000 Bounty for 2FA Bypass Vulnerability
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
Latest News
- Google Shells Out $600,000 for OSS-Fuzz Project Integrations
- F5 BIG-IP Vulnerability Can Lead to DoS, Code Execution
- Flaw in Cisco Industrial Appliances Allows Malicious Code to Persist Across Reboots
- UK Car Retailer Arnold Clark Hit by Ransomware
- Dealing With the Carcinization of Security
- HeadCrab Botnet Ensnares 1,200 Redis Servers for Cryptomining
- Cyber Insights 2023 | Supply Chain Security
- Cyber Insights 2023 | Regulations
