
Aura says a phishing attack led to a data breach affecting nearly 900,000 records, including names, emails, addresses and phone numbers.
Aura has confirmed a data breach that exposed nearly 900,000 records after an employee was targeted by a voice phishing (vishing) attack. The company said the incident involved a marketing platform inherited through a 2021 acquisition, not its core account systems.
According to the company’s disclosure, the exposed data included full names, email addresses, home addresses and phone numbers. About 20,000 current customers and 15,000 former customers were affected, and the broader dataset also contained a much larger pool of marketing contacts, the company said.
The disclosure followed claims by ShinyHunters, which listed Aura on its extortion site and said it had stolen 12GB files containing customer information and internal corporate data. Data breach monitoring services later reported a leaked CRM dataset containing more than 900,000 email records.
Aura has confirmed the breach itself but has not validated every claim made by the threat group. Public reporting also notes unresolved questions around the attackers’ broader allegations, including separate claims tied to single sign-on access.
Aura said Social Security Numbers (SSNs), passwords, and financial information were not exposed. That limits the immediate risk of direct account takeover, but the stolen contact data could still be used in follow-up phishing, impersonation or fraud campaigns.
Have I Been Pwned has already added the breach to its service, and breach trackers say the leaked data may include IP addresses and customer service comments. One monitoring report said most exposed email addresses had already appeared in earlier breaches.
Aura said it is working with external cybersecurity experts, has notified law enforcement and plans to notify affected individuals directly. That puts the case squarely in the now-familiar pattern of phishing-led compromise followed by extortion and public leakage.
The incident also spotlights a persistent acquisition risk, demonstrating how inherited tools and datasets can expand exposure years after a deal closes.
Even if the most sensitive financial details are not exposed, leaked contact information can still create real risk. Names, email addresses, home addresses, phone numbers and service-related notes can give scammers a trove of precious data to craft convincing phishing messages, impersonation attempts and fraud schemes to catch victims off guard.
In these situations, solutions like Bitdefender Digital Identity Protection can come in handy by helping users monitor whether their personal information appears in known breaches or on dubious corners of the public or Dark Web. For people concerned about how exposed data could be reused over time, this kind of oversight can make it easier to spot risks early and react before a follow-up scam turns into a bigger problem.
tags
Vlad's love for technology and writing created rich soil for his interest in cybersecurity to sprout into a full-on passion. Before becoming a Security Analyst, he covered tech and security topics.
View all posts