Warner Music Group last week started informing customers of its e-commerce websites that their personal information may have been compromised as a result of a data breach suffered by an external service provider.
In a data breach notification submitted to the California Attorney General, the music company said it learned of the breach on August 5, but the hackers had access to the impacted websites since April 25, 2020. It’s unclear exactly which sites were hacked, but the company said it was “a number of US-based e-commerce websites” that it operates.
The attackers may have copied information provided by users on the affected e-commerce websites, including name, email address, phone number, billing and shipping address, and payment card details such as card number, expiration date and CVV. Payments made via PayPal are not impacted.
Based on Warner Music’s limited description of the incident, this appears to be a Magecart-style attack, where cybercriminals compromise e-commerce websites or service providers and plant skimmer malware that harvests personal and financial information when customers make a purchase.
“While we cannot definitively confirm that your personal information was affected, it is possible that it might have been as your transaction(s) occurred during the period of compromise. If it was, this might have exposed you to a risk of fraudulent transactions being carried out using your details,” Warner Music wrote in a letter sent to potentially impacted customers.
Warner Music says it has launched an investigation into the incident and it has notified both law enforcement and the issuers of the compromised credit cards. The company is offering affected customers 12 months of free identity monitoring services through Kroll.
Related: Magecart Hackers Continue Improving Skimmers
Related: Magecart Group Hits 570 Websites in Three Years
Related: Magecart Attacks on Claire’s and Other U.S. Stores Linked to North Korea
Related: Website of Gunmaker Smith & Wesson Hacked in Magecart Attack

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- In Other News: AI Regulation, Layoffs, US Aerospace Attacks, Post-Quantum Encryption
- Evidence Suggests Ransomware Group Knew About MOVEit Zero-Day Since 2021
- Vulnerabilities in Honda eCommerce Platform Exposed Customer, Dealer Data
- Barracuda Urges Customers to Replace Hacked Email Security Appliances
- Google Patches Third Chrome Zero-Day of 2023
- ChatGPT Hallucinations Can Be Exploited to Distribute Malicious Code Packages
- AntChain, Intel Create New Privacy-Preserving Computing Platform for AI Training
- Several Major Organizations Confirm Being Impacted by MOVEit Attack
Latest News
- In Other News: AI Regulation, Layoffs, US Aerospace Attacks, Post-Quantum Encryption
- Blackpoint Raises $190 Million to Help MSPs Combat Cyber Threats
- Google Introduces SAIF, a Framework for Secure AI Development and Use
- ‘Asylum Ambuscade’ Group Hit Thousands in Cybercrime, Espionage Campaigns
- Evidence Suggests Ransomware Group Knew About MOVEit Zero-Day Since 2021
- SaaS Ransomware Attack Hit Sharepoint Online Without Using a Compromised Endpoint
- Google Cloud Now Offering $1 Million Cryptomining Protection
- Democrats and Republicans Are Skeptical of US Spying Practices, an AP-NORC Poll Finds
