Popular Sex Toy Brand Confirms Data Breach Exposed Customer Information

Japanese sex toy maker Tenga loses 600 US customer records in February phishing attack targeting single employee email

Annemarije de Boer Avatar
Annemarije de Boer Avatar

By

Image: Pixabay – Laety79

Key Takeaways

Key Takeaways

  • Phishing attack compromised 600 US customer records during one-hour window
  • Tenga implemented multi-factor authentication and security protocols after breach occurred
  • Intimate purchase data creates higher risks for targeted phishing attacks

A phishing attack on Japanese sex toy manufacturer Tenga compromised customer data for roughly 600 US buyers, highlighting how even privacy-focused companies remain vulnerable to basic email security failures. The February 12 breach occurred when hackers infiltrated a single employee’s professional email account during a narrow one-hour window between midnight and 1 AM Pacific.

The Attack Unfolded Like a Textbook Scam

The compromised employee’s inbox became a spam launcher, blasting malicious attachments to contacts before Tenga could respond. According to the company’s notification, no financial data, Social Security numbers, or store passwords were exposed—just names, email addresses, and historical correspondence about orders or customer service inquiries.

Privacy Stakes Run Higher for Intimate Purchases

Unlike a typical retail breach, exposed order details from adult product companies create perfect ammunition for targeted phishing or sextortion attempts. TechRadar analysis warns that “stealing order details… [provides] enough for sophisticated, tailored phishing attacks.” Your email address tied to intimate purchases becomes a vulnerability hackers can exploit with embarrassing precision.

Tenga’s Response Reveals Industry-Wide Security Gaps

Tenga immediately reset credentials, enabled multi-factor authentication across systems, and proactively contacted affected customers—moves that suggest the security basics weren’t already in place. This follows a troubling pattern in the adult product sector, with previous breaches hitting Lovense, Pornhub, and SexPanther. The company emphasized that Japanese customers and core e-commerce systems remained unaffected.

Your Defense Strategy Starts With Email Hygiene

Even though Tenga’s breach didn’t expose passwords, security experts recommend changing them anyway and watching for suspicious emails referencing your purchase history. The incident serves as a reminder that discreet shopping requires extra vigilance—your digital privacy depends on retailers implementing MFA and email security protocols before breaches occur, not after.

Share this

At Gadget Review, our guides, reviews, and news are driven by thorough human expertise and use our Trust Rating system and the True Score. AI assists in refining our editorial process, ensuring that every article is engaging, clear and succinct. See how we write our content here →