CRITICAL SEVERITYRetail

Aditya Birla Data Breach

Aditya Birla Fashion & Retail Breach (2021): 4.5 Million Indian Customer Records Including Income, Religion & Marital Status Exposed

Aditya Birla Fashion & Retail – major Indian apparel and lifestyle brand.

Verified by ObscureIQ Intelligence

9.0Severity
4.5MRecords
12Fields
2021Year

ObscureIQ Breach Intelligence Scores
6.4
Breach Risk Index
25
Data Value
25
Market Recency
453
days
Since Breach

Risk Interpretation

Exposure enables phishing, delivery scams, order fraud, and profiling based on retail behavior. Large brand portfolios also broaden the downstream targeting surface.

🎯 Impact & Downstream Threats

ABFRL responded publicly to the 2021 breach, acknowledging the incident, resetting customer passwords, enabling OTP authentication, and engaging external forensic investigators. The company stated that there was no operational or business impact and denied that financially sensitive payment data had been compromised. Independent reporting and the threat actor itself contradicted parts of that account, with claims of credit-card and CVV data in the leaked dataset. There is no public record of for

Primary downstream threats:
  • Credential stuffing against reused passwords across other platforms
  • Financial fraud using exposed financial profile data
  • SIM swap attacks where phone numbers are present
  • Targeted phishing campaigns using exposed email addresses
  • Doxxing risk from physical address exposure
  • Employment-based social engineering using job and employer data

🔓 Threat Vectors

Phishing, credential stuffing & account takeover
Loan fraud & targeted financial scams
Name-based social engineering
Profile enrichment
Vishing & authority impersonation
Credential stuffing & account takeover
SIM swapping, vishing & SMS phishing
Physical stalking, mail fraud & identity verification
Social engineering context
Romance & family emergency fraud
Targeted harassment & discrimination
Professional impersonation seeding
Lifestyle profiling & targeted fraud

📋 Breach Intelligence

EntityAditya Birla
Organization • India
Breach Date2021-12-01
DBC Added2025-01-29
Added Date2025-01-29
Records~4.5M (4,491,854 records)
Attack VectorMisconfiguration
Threat ActorShinyHunters
Data SubjectsCustomer: Direct
Breach PathwayDirect
SourceHave I Been Pwned / DataBreach.com / ObscureIQ
SensitivityElevated
Breach ID51;52
StatusConfirmed

📝 Executive Summary

Aditya Birla Fashion and Retail Ltd, the Indian fashion retailer that operates Pantaloons and a portfolio of premium apparel brands, was breached in December 2021 by the data-extortion group ShinyHunters. The attackers gained unauthorized access to the company's e-commerce database, exfiltrated roughly 700 GB of data, and demanded a ransom. ABFRL declined to pay, and the data was subsequently published on a hacking forum in January 2022.\n\nThe leaked corpus contained around 4.5 million customer records, with around 5.4 million unique email addresses across associated brand sites. Customer fields included names, salutations, phone numbers, physical addresses, gender, marital status, religion, income levels, job titles, purchase histories, and passwords stored as weak MD5 hashes. The dump also included employee records covering salary, marital status, and religion, alongside invoices, server logs, and portions of website source code. The threat actor claimed full payment-card data with CVV was also among the files, an assertion the company publicly disputed.\n\nFor affected customers, the practical risk extends beyond standard contact-fraud scenarios because of the unusual sensitivity of fields exposed. Religion and income data create profiling and discrimination risks specific to the Indian context. The MD5-hashed passwords are effectively crackable by modern standards, raising credential-stuffing risk wherever the same password was reused. Anyone who held a Pantaloons, Jaypore, or other ABFRL-brand account in 2021 should rotate passwords across services and treat unsolicited messages referencing past purchases or loyalty programs with caution.

🏢 About Aditya Birla

Aditya Birla Fashion and Retail Ltd, generally known by its abbreviation ABFRL, is one of India's largest fashion and lifestyle retailers and a subsidiary of the broader Aditya Birla Group. Headquartered in Mumbai, the company operates a portfolio of premium and mass-market apparel brands including Pantaloons, Louis Philippe, Van Heusen, Allen Solly, and Peter England, alongside the Jaypore.com online marketplace. As of late 2021, the company ran more than 3,200 company-owned stores and was present in roughly 26,000 multi-brand outlets across India. Its customer database spans both physical retail loyalty programs and direct e-commerce.

Company | Fashion retail and apparel commerce | Multi-brand fashion retailer | India
Indiaabfrl.in

🗂 Why They Hold Your Data

Multi-brand fashion retailers collect customer identity, contact details, addresses, order history, payment-adjacent data, and loyalty or marketing-engagement records across retail operations.

📰 Recent Developments

ABFRL has continued to operate and expand its retail and brand portfolio in the years since the 2021 breach. The company reset customer passwords and added one-time-passcode authentication after the incident. India's data-protection regime has matured significantly since 2021, with the Digital Personal Data Protection Act passed in 2023, which raises the regulatory expectations for any future incident at ABFRL or its peers. The company has not been publicly tied to a further large-scale breach disclosure since 2021. Public scrutiny of consumer-data practices in the Indian retail and e-commerce sector has increased steadily since the original incident.

🔍 Data Points Exposed

12 verified field types:
Email
Phone Number
Name;Email
Genders
Income levels
Job titles
Marital statuses
Names
Passwords
Phone numbers
Physical addresses
Purchases
Religions
Salutations

Exposure Categories

LocationPHYS ADDR
FinancialFIN PROFILE
EmploymentJOB INFO

Canonical Fields

email_address, financial_profile:income, full_name, gender, job_information:job_title, password, phone_number, physical_address, relationship_status:marital, religion, salutation, transaction_history:purchase

🌐 Dark Web Verification

Confirmed

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of Aditya Birla
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

MisconfigurationRetailEmailPhoneAddressPasswordsFinancial Data

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom