MuscularMD
Member
Got this email this morning.
Hello,
We are writing to inform you of a security incident involving one of our systems. We are sorry this happened and for the concern and disruption it may cause.
What happened
On Feb 2 we detected unauthorized access to one of our systems, took services offline to contain it, identified and patched the entry point, and restored service early on Feb 3. The attacker copied database data and later attempted extortion.
What did NOT happen
• We have no evidence of customer funds being stolen or unauthorized charges resulting from this incident.
• We have no evidence that any email inboxes were accessed (no evidence emails were stolen or read).
What data may be involved
Depending on what you provided to use the service, copied database data may include a combination of:
• Contact information
• Order/invoice data
• Shipping/billing addresses (if provided)
• Test reports and report-related data
• Images of samples/packages uploaded as part of workflows
• Limited technical metadata (e.g., IP address associated with certain events)
What you should do now (most important)
• Do not respond to extortion or “we have your data” messages.
• Be alert for phishing/impersonation attempts referencing your orders or reports. Do not click unexpected links or open attachments.
• We will only contact you from @janoshik.com email addresses, and we will never ask you to share passwords, seed phrases/private keys, remote access, or payment to “remove your data.”
• If you receive anything suspicious referencing Janoshik, forward it to security@janoshik.com. If possible, include full email headers.
Incident updates
We will post updates at: leak.janoshik.com
Thank you for your trust, and we apologize again for the disruption.
With best regards,
Janoshik Security Team
security@janoshik.com
Hello,
We are writing to inform you of a security incident involving one of our systems. We are sorry this happened and for the concern and disruption it may cause.
What happened
On Feb 2 we detected unauthorized access to one of our systems, took services offline to contain it, identified and patched the entry point, and restored service early on Feb 3. The attacker copied database data and later attempted extortion.
What did NOT happen
• We have no evidence of customer funds being stolen or unauthorized charges resulting from this incident.
• We have no evidence that any email inboxes were accessed (no evidence emails were stolen or read).
What data may be involved
Depending on what you provided to use the service, copied database data may include a combination of:
• Contact information
• Order/invoice data
• Shipping/billing addresses (if provided)
• Test reports and report-related data
• Images of samples/packages uploaded as part of workflows
• Limited technical metadata (e.g., IP address associated with certain events)
What you should do now (most important)
• Do not respond to extortion or “we have your data” messages.
• Be alert for phishing/impersonation attempts referencing your orders or reports. Do not click unexpected links or open attachments.
• We will only contact you from @janoshik.com email addresses, and we will never ask you to share passwords, seed phrases/private keys, remote access, or payment to “remove your data.”
• If you receive anything suspicious referencing Janoshik, forward it to security@janoshik.com. If possible, include full email headers.
Incident updates
We will post updates at: leak.janoshik.com
Thank you for your trust, and we apologize again for the disruption.
With best regards,
Janoshik Security Team
security@janoshik.com
