{
	"id": "32bf0c67-c8f7-4b4f-af69-a5934142a4b8",
	"created_at": "2026-04-06T00:19:07.916082Z",
	"updated_at": "2026-04-10T13:12:55.257007Z",
	"deleted_at": null,
	"sha1_hash": "b6d7596157e5d32823d7c9f1c73c50d5ea42b82c",
	"title": "Shutterfly discloses data breach after Conti ransomware attack",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 2299368,
	"plain_text": "Shutterfly discloses data breach after Conti ransomware attack\r\nBy Lawrence Abrams\r\nPublished: 2022-03-29 · Archived: 2026-04-05 19:04:22 UTC\r\nOnline retail and photography manufacturing platform Shutterfly has disclosed a data breach that exposed employee\r\ninformation after threat actors stole data during a Conti ransomware attack.\r\nShutterfly offers photography-related services to consumers, the enterprise, and education through various brands,\r\nincluding Shutterfly.com, BorrowLenses, GrooveBook, Snapfish, and Lifetouch.\r\nToday, Shutterfly disclosed that its network was breached on December 3rd, 2021, due to a ransomware attack.\r\nhttps://www.bleepingcomputer.com/news/security/shutterfly-discloses-data-breach-after-conti-ransomware-attack/\r\nPage 1 of 5\n\n0:00\r\nhttps://www.bleepingcomputer.com/news/security/shutterfly-discloses-data-breach-after-conti-ransomware-attack/\r\nPage 2 of 5\n\nVisit Advertiser websiteGO TO PAGE\r\nDuring ransomware attacks, threat actors will gain access to a corporate network and steal data and files as they spread\r\nthroughout the system. Once they gain access to a Windows domain controller, and after harvesting all valuable data, they\r\ndeploy their ransomware to encrypt all network devices.\r\nAccording to Shutterfly's data breach notification, the Conti threat actor deployed the ransomware on December 13th, 2021,\r\nwhen the company first became aware that they were compromised.\r\n\"The attacker both locked up some of our systems and accessed some of the data on those systems. This included access to\r\npersonal information of certain people, including you,\" reads Shutterfly's data breach notification filed with the California\r\nAttorney General's Office.\r\n\"We believe the access occurred on or about December 3, 2021. We discovered the incident on December 13, 2021.\r\nShutterfly states that the documents stolen during the attack may have contained employees' personal information, including\r\nnames, salary and compensation information, and FMLA leave or workers’ compensation claims.\r\nShutterfly is offering two years of free credit monitoring from Equifax for those affected.\r\nShutterfly hit by Conti Ransomware\r\nWhile Shutterfly's data breach notification did not shed much light on their attack, BleepingComputer broke the news in\r\nDecember that the company had suffered a Conti ransomware attack.\r\nAt the time of the attack, a source told BleepingComputer that Conti had encrypted over 4,000 devices and 120 VMware\r\nESXi servers belonging to Shutterfly.\r\nA private data leak page also showed samples of the data stolen from Shutterfly, which we are told included legal\r\nagreements, bank and merchant account info, login credentials for corporate services, spreadsheets, and what appears to be\r\ncustomer information, including the last four digits of credit cards.\r\nhttps://www.bleepingcomputer.com/news/security/shutterfly-discloses-data-breach-after-conti-ransomware-attack/\r\nPage 3 of 5\n\nConti ransomware data leak page for Shutterfly\r\nSince then, the Conti ransomware operation has released 7.02 GB of data they claim was stolen during the attack, including\r\narchives named for finance, legal, customer service, and payroll data.\r\nShutterfly states that they are working with outside cybersecurity experts to continue investigating the attack.\r\nHowever, Shutterfly warns employees to continue monitoring their credit reports and accounts for suspicious activity and to\r\nremain vigilant.\r\nhttps://www.bleepingcomputer.com/news/security/shutterfly-discloses-data-breach-after-conti-ransomware-attack/\r\nPage 4 of 5\n\nAutomated Pentesting Covers Only 1 of 6 Surfaces.\r\nAutomated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the\r\nother.\r\nThis whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic\r\nquestions for any tool evaluation.\r\nSource: https://www.bleepingcomputer.com/news/security/shutterfly-discloses-data-breach-after-conti-ransomware-attack/\r\nhttps://www.bleepingcomputer.com/news/security/shutterfly-discloses-data-breach-after-conti-ransomware-attack/\r\nPage 5 of 5",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://www.bleepingcomputer.com/news/security/shutterfly-discloses-data-breach-after-conti-ransomware-attack/"
	],
	"report_names": [
		"shutterfly-discloses-data-breach-after-conti-ransomware-attack"
	],
	"threat_actors": [],
	"ts_created_at": 1775434747,
	"ts_updated_at": 1775826775,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/b6d7596157e5d32823d7c9f1c73c50d5ea42b82c.pdf",
		"text": "https://archive.orkl.eu/b6d7596157e5d32823d7c9f1c73c50d5ea42b82c.txt",
		"img": "https://archive.orkl.eu/b6d7596157e5d32823d7c9f1c73c50d5ea42b82c.jpg"
	}
}