Belk Data Breach: 150GB Stolen in Cyberattack, Lawsuits Filed

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 
July 17, 2025 2 min read

Belk Cyberattack Overview

Belk Cyberattack

Image courtesy of Security Affairs

Ransomware group DragonForce claimed responsibility for a cyberattack on U.S. retailer Belk, occurring between May 7 and 11, 2025. During this incident, over 150GB of data was stolen, including sensitive internal documents containing personal information such as names and Social Security numbers. The group announced the attack, asserting that they had accessed certain corporate systems without authorization.

Belk's incident report states, "Specifically, Belk was the victim of a cyber incident in which an unauthorized third party gained access to certain corporate systems and data between May 7-11, 2025." The company notified the New Hampshire Attorney General’s Office about the breach and has been cooperating with law enforcement during the investigation.

To mitigate the incident, Belk implemented measures including restricting network access, blocking threats, resetting passwords, and enhancing security monitoring. Affected individuals are being offered 12 months of free credit monitoring and identity restoration services.

Links:

Cybersecurity Vulnerability in Fortinet FortiWeb

Fortinet Logo

Image courtesy of Security Affairs

Fortinet has issued a critical alert regarding a pre-authentication remote code execution (RCE) vulnerability identified as CVE-2025-25257 in FortiWeb, rated with a CVSS score of 9.8. This SQL injection vulnerability allows unauthenticated attackers to execute unauthorized SQL commands through crafted HTTP/HTTPS requests.

The advisory states, “An improper neutralization of special elements used in an SQL command (‘SQL Injection’) vulnerability in FortiWeb may allow an unauthenticated attacker to execute unauthorized SQL code or commands via crafted HTTP or HTTPS requests.”

Fortinet has released patches in versions 7.6.4, 7.4.8, 7.2.11, and 7.0.11 to address this issue. Security researchers from WatchTowr have analyzed the vulnerability and created a detection artifact generator for it.

Administrators are urged to apply these patches immediately, as the availability of public exploits raises concerns about potential active exploitation.

Links:

Legal Actions Against Belk

Belk Inc. is facing class action lawsuits for allegedly failing to protect the personal information of its employees and customers. The lawsuits claim that the company concealed the cyberattack that led to the data breach. This legal action highlights the increasing scrutiny on organizations regarding their cybersecurity practices and responsibilities.

The lawsuits filed in North Carolina assert that Belk did not take adequate measures to safeguard sensitive data, potentially leaving individuals vulnerable to identity theft and fraud.

Links:

Explore our services at Gopher Security for comprehensive cybersecurity solutions tailored to protect your organization from evolving threats. Contact us today for more information.

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 

MBA-credentialed cybersecurity expert specializing in Post-Quantum Cybersecurity solutions with proven capability to reduce attack surfaces by 90%.

Related News

CVE-2025-15467: Critical OpenSSL RCE and DoS Vulnerability Overview
OpenSSL vulnerability

CVE-2025-15467: Critical OpenSSL RCE and DoS Vulnerability Overview

Urgent: OpenSSL 3.x vulnerable to CVE-2025-15467, enabling pre-auth RCE. Learn affected versions, impact, and immediate mitigation steps. Protect your systems now!

By Divyansh Ingle March 10, 2026 4 min read
common.read_full_article
SolarWinds Patches Critical Web Help Desk RCE Vulnerabilities Now
SolarWinds Web Help Desk

SolarWinds Patches Critical Web Help Desk RCE Vulnerabilities Now

Critical RCE & Auth Bypass flaws in SolarWinds Web Help Desk are fixed! Don't risk it. Update to v2026.1 now to protect your systems. Learn more.

By Edward Zhou March 9, 2026 4 min read
common.read_full_article
AI vs Human Hackers: Who Prevails in 2026 Pen Testing?
AI hacking

AI vs Human Hackers: Who Prevails in 2026 Pen Testing?

Discover the results of a groundbreaking study comparing AI agents and human hackers in web vulnerability exploitation. See who prevails and what it means for your security. Read now!

By Jim Gagnard March 6, 2026 6 min read
common.read_full_article
Vulnerability Exploits Lead Cyber Intrusions in 2026 Trends
vulnerability exploits

Vulnerability Exploits Lead Cyber Intrusions in 2026 Trends

Exploits are now the top intrusion method, outpacing phishing. Discover why rapid vulnerability patching is critical and how to bolster your defenses. Read more!

By Edward Zhou March 4, 2026 4 min read
common.read_full_article