Protect.Computer
NEWS

Hims & Hers discloses Zendesk-related data exposure risk

· 1 min read · Data breach Identity theft

What happened

Hims & Hers warned that customer-support data may have been exposed through third-party ticketing infrastructure tied to Zendesk workflows. The company advised users to stay alert for suspicious outreach and to review account protections.

Why this matters

Support systems often hold sensitive profile details and contact history. Even when core payment systems are unaffected, exposed support data can fuel phishing, SIM-swap attempts, and account-takeover campaigns.

How to check if you’re affected

You may be affected if you had recent support interactions with Hims & Hers via Zendesk-backed workflows during the disclosed incident window (affected users/scope: customers with support-ticket metadata in impacted systems; affected versions: not a software version issue, this is an incident-window data exposure scope).

  1. Check your email and in-app notices for any official incident notification.
  2. Reset your account password and ensure it is unique.
  3. Enable multi-factor authentication where available.
  4. Watch for phishing emails/SMS referencing support tickets, prescriptions, or account updates.
  5. Review account activity for unfamiliar logins or profile changes.

Immediate defensive actions

  • Treat unexpected “support follow-up” messages as suspicious unless verified through official channels.
  • Do not share one-time codes with support agents over phone/chat.
  • Place extra monitoring on financial and telecom accounts if personal data may have been exposed.

Sources

Bottom line

Third-party support tooling can become a weak link. If you used affected support channels, harden account access now and remain alert for targeted social-engineering attempts.

Related reading