On Friday, September 26–27, 2025 (UK time), Harrods warned that a third-party provider suffered an intrusion that exposed some online customers’ basic personal details (names and contact information). Harrods says its own systems weren’t breached, payment data and passwords weren’t taken, and the incident is separate from hacking activity it faced earlier this year. Authorities have been notified.
Harrods notified customers after it was alerted to a compromise at one of its external service providers. The company says some online shoppers’ “basic” personal details were accessed, while account passwords and payment information were not. Harrods characterizes the event as an isolated third-party breach and says it has been contained.
The most recent reports place the scope at about 430,000 customer records, with data elements including name, email address, phone number, and postal address- but no passwords or card data.
Harrods says that the current third-party incident they’re dealing with is not related to the attempted intrusion that prompted the retailer to restrict online access in May. Separately, UK police arrested four suspects in July in connection with attacks earlier in the year that targeted Harrods, along with Marks & Spencer and the Co-op. Those law-enforcement actions concern the spring wave of retail attacks, not this third-party breach.
The data reportedly includes customer identifiers such as names and contact details. Even without payment data, this information has operational value to attackers: it enables convincing phishing, refund-fraud social engineering, and account-recovery attempts at scale- especially if criminals can correlate these records with other leaks. Security teams should assume targeted lures (order-status, delivery-exception, loyalty-program messages) will follow.
Harrods has not publicly named the vendor. In UK GDPR terms, this is a processor incident affecting a retailer that remains the controller for its customers’ personal data. Processors must notify controllers “without undue delay,” and controllers must assess and, if required, report to the ICO within 72 hours and inform affected individuals if the risk is high.
The timing tracks with a bruising year for UK consumer brands. The Co-op recently detailed the earnings impact of its April cyberattack, and other household names have reported operational disruption or data exposure in 2025. While those events are not the same incident, they illustrate a sustained, retail-focused threat tempo that blends social engineering with supplier compromise.
Under UK GDPR, controllers must log and, where risk warrants, report breaches to the ICO within 72 hours; processors must promptly inform controllers. Individuals who suffer material or non-material damage can pursue compensation against controllers and, in some cases, processors. Expect standard ICO follow-up and (depending on risk assessment) individual notifications to affected customers.
The post Harrods Data Breach Explained appeared first on Centraleyes.
*** This is a Security Bloggers Network syndicated blog from Centraleyes authored by Rebecca Kappel. Read the original post at: https://www.centraleyes.com/harrods-data-breach-explained/