Belk Data Breach: 150GB Stolen in Cyberattack, Lawsuits Filed

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 
July 17, 2025 2 min read

Belk Cyberattack Overview

Belk Cyberattack

Image courtesy of Security Affairs

Ransomware group DragonForce claimed responsibility for a cyberattack on U.S. retailer Belk, occurring between May 7 and 11, 2025. During this incident, over 150GB of data was stolen, including sensitive internal documents containing personal information such as names and Social Security numbers. The group announced the attack, asserting that they had accessed certain corporate systems without authorization.

Belk's incident report states, "Specifically, Belk was the victim of a cyber incident in which an unauthorized third party gained access to certain corporate systems and data between May 7-11, 2025." The company notified the New Hampshire Attorney General’s Office about the breach and has been cooperating with law enforcement during the investigation.

To mitigate the incident, Belk implemented measures including restricting network access, blocking threats, resetting passwords, and enhancing security monitoring. Affected individuals are being offered 12 months of free credit monitoring and identity restoration services.

Links:

Cybersecurity Vulnerability in Fortinet FortiWeb

Fortinet Logo

Image courtesy of Security Affairs

Fortinet has issued a critical alert regarding a pre-authentication remote code execution (RCE) vulnerability identified as CVE-2025-25257 in FortiWeb, rated with a CVSS score of 9.8. This SQL injection vulnerability allows unauthenticated attackers to execute unauthorized SQL commands through crafted HTTP/HTTPS requests.

The advisory states, “An improper neutralization of special elements used in an SQL command (‘SQL Injection’) vulnerability in FortiWeb may allow an unauthenticated attacker to execute unauthorized SQL code or commands via crafted HTTP or HTTPS requests.”

Fortinet has released patches in versions 7.6.4, 7.4.8, 7.2.11, and 7.0.11 to address this issue. Security researchers from WatchTowr have analyzed the vulnerability and created a detection artifact generator for it.

Administrators are urged to apply these patches immediately, as the availability of public exploits raises concerns about potential active exploitation.

Links:

Legal Actions Against Belk

Belk Inc. is facing class action lawsuits for allegedly failing to protect the personal information of its employees and customers. The lawsuits claim that the company concealed the cyberattack that led to the data breach. This legal action highlights the increasing scrutiny on organizations regarding their cybersecurity practices and responsibilities.

The lawsuits filed in North Carolina assert that Belk did not take adequate measures to safeguard sensitive data, potentially leaving individuals vulnerable to identity theft and fraud.

Links:

Explore our services at Gopher Security for comprehensive cybersecurity solutions tailored to protect your organization from evolving threats. Contact us today for more information.

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 

MBA-credentialed cybersecurity expert specializing in Post-Quantum Cybersecurity solutions with proven capability to reduce attack surfaces by 90%.

Related News

CISA Adds Critical VMware vCenter RCE Flaw to Exploited Catalog
VMware vCenter vulnerability

CISA Adds Critical VMware vCenter RCE Flaw to Exploited Catalog

VMware vCenter Server vulnerability CVE-2024-37079 is actively exploited. CISA orders federal agencies to patch. Learn how to protect your critical infrastructure. Read more!

By Divyansh Ingle January 28, 2026 2 min read
common.read_full_article
Instagram Vulnerability Exposes Private Data of Millions
Instagram security

Instagram Vulnerability Exposes Private Data of Millions

Instagram's private posts exposed, millions affected by data breaches, and new location features pose risks. Discover how Gopher Security's AI-powered Zero-Trust architecture protects your data. Learn more!

By Brandon Woo January 27, 2026 4 min read
common.read_full_article
Closing the Cloud Complexity Gap: Insights from 2026 Security Reports
cloud security

Closing the Cloud Complexity Gap: Insights from 2026 Security Reports

Navigate the escalating complexity of cloud security. Discover how AI, Zero-Trust, and unified ecosystems are essential to combatting modern threats. Learn more!

By Divyansh Ingle January 26, 2026 6 min read
common.read_full_article
AI-Driven Cybersecurity Innovations: The Future of Threat Prevention
AI agents security

AI-Driven Cybersecurity Innovations: The Future of Threat Prevention

AI agents are prime targets for cyberattacks. Discover evolving threats like prompt injection & AI-powered exploits, and learn how to fortify your defenses. Read now!

By Brandon Woo January 22, 2026 5 min read
common.read_full_article