{"id":886956,"date":"2026-01-22T18:12:05","date_gmt":"2026-01-23T00:12:05","guid":{"rendered":"https:\/\/newsycanuse.com\/index.php\/2026\/01\/22\/online-retailer-pccomponentes-says-data-breach-claims-are-fake\/"},"modified":"2026-01-22T18:12:05","modified_gmt":"2026-01-23T00:12:05","slug":"online-retailer-pccomponentes-says-data-breach-claims-are-fake","status":"publish","type":"post","link":"https:\/\/newsycanuse.com\/index.php\/2026\/01\/22\/online-retailer-pccomponentes-says-data-breach-claims-are-fake\/","title":{"rendered":"Online retailer PcComponentes says data breach claims are fake"},"content":{"rendered":"<div>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"Online retailer PcComponentes says data breach claims are fake\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2026\/01\/21\/PcComponentes.jpg\" width=\"1600\"><\/p>\n<p>PcComponentes, a major technology retailer in Spain, has denied claims of a data breach on its systems impacting 16 million customers, but confirmed it suffered a credential stuffing attack.<\/p>\n<p>The Spanish e-commerce company specializes in the sale of\u00a0computers, laptops, peripherals, and hardware, and has an estimated 75 million unique marketplace visitors per year.<\/p>\n<p>Yesterday, a threat actor named \u2018daghetiaw\u2019 published what they claimed to be a customer database stolen from PcComponentes, containing 16.3 million records. The threat actor leaked 500,000 records and offered to sell the rest to the highest bidder.<\/p>\n<p><a href=\"https:\/\/www.wiz.io\/lp\/inside-mcp-security-a-research-guide-on-emerging-risks?utm_source=bleepingcomputer&#038;utm_medium=display&#038;utm_campaign=FY26Q2_INB_FORM_MCP-Security-Research-Guide-Emerging-Risks&#038;sfcid=701Py00000PcNI9IAN&#038;utm_term=FY26Q4-bleepingcomputer-970x250&#038;utm_content=MCP-Security-Guide\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/w\/wiz\/MCP-Research-Guide-970x250.png\" alt=\"Wiz\"><\/a>\n<\/p>\n<p>The leaked data contains order details, physical addresses, full names, phone numbers, IP addresses, product wish-lists, and customer support messages exchanged with the firm via Zendesk.<\/p>\n<div>\n<figure><img loading=\"lazy\" decoding=\"async\" alt=\"PcComponents data leak on hacker forums\" height=\"600\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1220909\/2026\/January\/breached.jpg\" width=\"789\"><figcaption><strong>PcComponents data leak on hacker forums<\/strong><br \/><em>Source: BleepingComputer<\/em><\/figcaption><\/figure>\n<\/div>\n<p>In an announcement today, PcComponents says that it investigated a possible breach of its systems, but its security experts found no evidence of unauthorized access.<\/p>\n<p>&#8220;There has been no illegitimate access to our databases or internal systems,&#8221; the company assures, adding that &#8220;the figure of 16 million supposedly affected customers is false, as the number of active PcComponentes accounts is significantly lower.&#8221;<\/p>\n<p>The company also underlined that no financial details or customer passwords are stored on its systems.<\/p>\n<p>However, PcComponentes admitted that its investigation discovered evidence of a credential stuffing attack on its platform. This means that a threat actor tried email addresses and passwords from other security breaches or leaked databases to find PcComponentes accounts.<\/p>\n<p>Credential stuffing attacks are typically automated and rely on large volumes of reused login credentials from other services.<\/p>\n<p>An investigation from threat intelligence company Hudson Rock discovered that the attackers likely collected the login data from computers infected with info-stealing malware.<\/p>\n<p>&#8220;Every single email we checked from the threat actor\u2019s sample was found in existing infostealer logs,&#8221; <a href=\"https:\/\/www.infostealers.com\/article\/pccomponentes-breach-how-infostealer-logs-enable-convincing-credential-stuffing\/\" target=\"_blank\" rel=\"nofollow noopener\">Hudson Rock says<\/a> in a post today, adding that some of the logins were as old as 2020.<\/p>\n<p>A\u00a0screenshot that Hudson Rock published shows a set of six email addresses that were verified and all of them\u00a0were marked as previously compromised in infostealer infections.<\/p>\n<p>According to <a href=\"https:\/\/www.pccomponentes.com\/actualizacion-importante-oficial-seguridad-datos\" target=\"_blank\" rel=\"nofollow noopener\">PcComponentes\u2019 announcement<\/a>, the following data was exposed for a small number of compromised accounts:<\/p>\n<ul>\n<li>First and last names<\/li>\n<li>National ID number<\/li>\n<li>Physical addresses<\/li>\n<li>IP addresses<\/li>\n<li>Email addresses<\/li>\n<li>Phone numbers<\/li>\n<\/ul>\n<p>In response to the\u00a0incident, PcComponentes has implemented a set of defenses that include CAPTCHA on the login pages, mandatory activation of two-factor authentication (2FA) for all accounts, and invalidation of all active sessions.<\/p>\n<p>As a result, customers will be automatically logged out, and accounts without two-factor authentication (2FA) will be required to enable it before regaining access.<\/p>\n<p>PcComponentes also recommends that customers use strong, unique passwords for each account, store their passwords in a password manager, and stay vigilant for potential phishing messages.<\/p>\n<p>BleepingComputer has contacted PcComponentes to ask how many customers have been impacted precisely, but a statement wasn\u2019t immediately available.<\/p>\n<div>\n<p><a href=\"https:\/\/www.wiz.io\/lp\/secrets-security-cheat-sheet?utm_source=bleepingcomputer&#038;utm_medium=display&#038;utm_campaign=FY26Q3_INB_FORM_Secret-Security-Sprawl-to-Control&#038;sfcid=701Py00000T0tF9IAJ&#038;utm_term=FY26Q4-bleepingcomputer-article-ad&#038;utm_content=Secrets-Security\" target=\"_blank\" rel=\"noopener sponsored\"><br \/>\n            <img decoding=\"async\" alt=\"Wiz\" src=\"https:\/\/www.bleepstatic.com\/c\/w\/wiz\/Secrets-Security-512x512.png\" previous-src=\"https:\/\/www.bleepstatic.com\/c\/w\/wiz\/Secrets-Security-512x512.png\"><\/a>\n    <\/p>\n<div>\n<h2><a href=\"https:\/\/www.wiz.io\/lp\/secrets-security-cheat-sheet?utm_source=bleepingcomputer&#038;utm_medium=display&#038;utm_campaign=FY26Q3_INB_FORM_Secret-Security-Sprawl-to-Control&#038;sfcid=701Py00000T0tF9IAJ&#038;utm_term=FY26Q4-bleepingcomputer-article-ad&#038;utm_content=Secrets-Security\" target=\"_blank\" rel=\"noopener sponsored\">Secrets Security Cheat Sheet: From Sprawl to Control <\/a><\/h2>\n<p>Whether you&#8217;re cleaning up old keys or setting guardrails for AI-generated code, this guide helps your team build securely from the start.<\/p>\n<p>Get the cheat sheet and take the guesswork out of secrets management.<\/p>\n<\/p><\/div>\n<\/div><\/div>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/online-retailer-pccomponentes-says-data-breach-claims-are-fake\/\" class=\"button purchase\" rel=\"nofollow noopener\" target=\"_blank\">Read More<\/a><br \/>\n Bill Toulas<\/p>\n","protected":false},"excerpt":{"rendered":"<p>PcComponentes, a major technology retailer in Spain, has denied claims of a data breach on its systems impacting 16 million customers, but confirmed it suffered a credential stuffing attack. The Spanish e-commerce company specializes in the sale of\u00a0computers, laptops, peripherals, and hardware, and has an estimated 75 million unique marketplace visitors per year. Yesterday, a<\/p>\n","protected":false},"author":1,"featured_media":886957,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1538,24068,46],"tags":[],"class_list":{"0":"post-886956","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-online","8":"category-retailer","9":"category-technology"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/886956","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/comments?post=886956"}],"version-history":[{"count":0,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/886956\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media\/886957"}],"wp:attachment":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media?parent=886956"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/categories?post=886956"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/tags?post=886956"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}