Announcement:
We detected unauthorized access on Feb 2, took affected services offline to contain it, patched the entry point, and restored service early Feb 3. Later we found out the attacker copied database data and later attempted extortion.
What did not happen: we have no evidence of customer funds being stolen and no evidence that email inboxes were accessed (no evidence emails were stolen/read).
The main practical risk is phishing/impersonation using stolen order/report/shipping details. Please don’t engage with extortion messages.
We’ll post updates on leak.janoshik.com. If you receive anything suspicious referencing Janoshik, forward it to dedicated email security@janoshik.com
We detected unauthorized access on Feb 2, took affected services offline to contain it, patched the entry point, and restored service early Feb 3. Later we found out the attacker copied database data and later attempted extortion.
What did not happen: we have no evidence of customer funds being stolen and no evidence that email inboxes were accessed (no evidence emails were stolen/read).
The main practical risk is phishing/impersonation using stolen order/report/shipping details. Please don’t engage with extortion messages.
We’ll post updates on leak.janoshik.com. If you receive anything suspicious referencing Janoshik, forward it to dedicated email security@janoshik.com
