{
	"id": "97657d5e-61fb-4bd0-886a-94b38f7d1833",
	"created_at": "2026-04-06T01:31:04.541358Z",
	"updated_at": "2026-04-10T03:21:36.37344Z",
	"deleted_at": null,
	"sha1_hash": "10fc682eb57082a25524d40d4ceef359db3c3ce9",
	"title": "Luxottica data breach exposes 820K EyeMed, LensCrafters patients",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 2262263,
	"plain_text": "Luxottica data breach exposes 820K EyeMed, LensCrafters patients\r\nBy Lawrence Abrams\r\nPublished: 2020-11-12 · Archived: 2026-04-06 00:21:17 UTC\r\n11/12/20 update below. This post was originally published on November 7th.\r\nA Luxottica data breach has exposed the personal and protected health information of 829,454 patients at LensCrafters,\r\nTarget Optical, EyeMed, and other eye care practices.\r\nLuxottica is the world's largest eyewear company with a portfolio of well-known eyeglass brands, including Ray-Ban,\r\nOakley, Oliver Peoples, Ferrari, Michael Kors, Bulgari, Armani, Prada, Chanel, and Coach.\r\nhttps://www.bleepingcomputer.com/news/security/luxottica-data-breach-exposes-820k-eyemed-lenscrafters-patients/\r\nPage 1 of 4\n\n0:00\r\nhttps://www.bleepingcomputer.com/news/security/luxottica-data-breach-exposes-820k-eyemed-lenscrafters-patients/\r\nPage 2 of 4\n\nVisit Advertiser websiteGO TO PAGE\r\nIn addition to selling eyeglasses, Luxottica also operates the EyeMed vision benefits company and partners with eye care\r\nprofessionals as part of their LensCrafters, Target Optical, EyeMed, and Pearle Vision retail outlets.\r\nThese partners get access to a web-based appointment scheduling application that allows patients to schedule appointments\r\nonline or over the phone.\r\nData breach in the appointment scheduling system\r\nIn a \"Security Incident\" notification issued this week, Luxottica disclosed that their appointment scheduling application\r\nsuffered a data breach after being hacked on August 5th, 2020.\r\nLuxottica states that they first learned about this breach on August 9 and, after investigating the attack, determined on\r\nAugust 28 that the attacker gained access to patients' personal information.\r\n\"On August 9, 2020, Luxottica learned of the incident, contained it, and immediately began an investigation to determine the\r\nextent of the incident. On August 28, 2020, we preliminarily concluded that the attacker may have accessed and acquired\r\npatient information,\" the Luxottica data breach notification states.\r\nThe exposed information includes personal data (PII) and protected health information (PHI), including medical conditions\r\nand history.\r\n\"The personal information involved in this incident may have included: full name, contact information, appointment date\r\nand time, health insurance policy number, and doctor or appointment notes that may indicate information related to eye care\r\ntreatment, such as prescriptions, health conditions or procedures,\" Luxottica warned.\r\nFor some patients, credit card numbers and social security numbers were also exposed.\r\nIf a patient had their payment information and SSNs exposed, Luxottica offers a free two-year identity monitoring service\r\nthrough Kroll.\r\nLuxottica is not aware of any misuse of the accessed data but advises all patients to watch out for notices from their health\r\ninsurers or health care providers and monitor their credit statements and history for fraudulent activity.\r\n\"We recommend that all potentially impacted individuals take steps to protect themselves, for example by closely\r\nmonitoring notices from your health insurer and health care providers for unexpected activity. If your payment card\r\ninformation and/or Social Security number were involved in this incident, this is explicitly stated in your letter,\" Luxottica\r\nadvised on a web site created specifically for this data breach.\r\nOn October 27th, Luxottica has begun to mail notices to those who are affected. They have also started releasing press\r\nreleases on websites for local newspapers to alert patients of the data breach.\r\nUpdate 11/12/20: A new notification filed with the U.S. Department of Health and Human Services indicates that this breach\r\naffected 829,454 patients and is classified as a \"Hacking/IT Incident.\"\r\nAll affected users should have been notified via email at this point. If you have not been notified and are concerned your\r\ninformation was exposed, you can contact Luxottica at (877) 540-1431.\r\nAll affected users should have been This data breach comes on the heels of a recent Nefilim ransomware attack on\r\nLuxottica that occurred on September 18th, 2020, and caused significant outages, interruptions, and theft of unencrypted\r\nfiles.\r\nhttps://www.bleepingcomputer.com/news/security/luxottica-data-breach-exposes-820k-eyemed-lenscrafters-patients/\r\nPage 3 of 4\n\nAutomated Pentesting Covers Only 1 of 6 Surfaces.\r\nAutomated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the\r\nother.\r\nThis whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic\r\nquestions for any tool evaluation.\r\nSource: https://www.bleepingcomputer.com/news/security/luxottica-data-breach-exposes-820k-eyemed-lenscrafters-patients/\r\nhttps://www.bleepingcomputer.com/news/security/luxottica-data-breach-exposes-820k-eyemed-lenscrafters-patients/\r\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://www.bleepingcomputer.com/news/security/luxottica-data-breach-exposes-820k-eyemed-lenscrafters-patients/"
	],
	"report_names": [
		"luxottica-data-breach-exposes-820k-eyemed-lenscrafters-patients"
	],
	"threat_actors": [],
	"ts_created_at": 1775439064,
	"ts_updated_at": 1775791296,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/10fc682eb57082a25524d40d4ceef359db3c3ce9.pdf",
		"text": "https://archive.orkl.eu/10fc682eb57082a25524d40d4ceef359db3c3ce9.txt",
		"img": "https://archive.orkl.eu/10fc682eb57082a25524d40d4ceef359db3c3ce9.jpg"
	}
}