
Eyemart Express, a national optical retailer founded in 1990 with nearly 250 stores across 42 states, has been targeted in a data breach involving highly sensitive personal and medical information.
A filing with details of the breach was posted to the Texas Attorney General on April 17, 2026. The total number of individuals affected across the United States has not been specified publicly at this time.
On March 10, 2026, Payouts King, a ransomware group, posted on the dark web claiming to have obtained 435 gigabytes of Eyemart Express' internal data.
According to the group's claims, the compromised information includes corporate correspondence, employee personally identifiable information, financial documents, payroll reports, customer medical records, accident reports, corporate documents, non-disclosure agreements, contracts and employee personal folders and documents. The breadth of the claimed data reportedly spans customer records, employee files and internal corporate documents.
The types of consumer information confirmed to have been exposed in the breach include personally identifiable information (PII) such as names, addresses, Social Security numbers, driver's license numbers and dates of birth. The breach also involved protected health information (PHI), including medical information and health insurance information.
At this time, no details regarding credit monitoring, identity protection services or other resources for affected individuals have been included in publicly available records at this time.
Because highly sensitive information was involved in this breach, affected individuals may want to take protective action rather than waiting for a formal notification from the company.
Consumers who have provided personal or medical information to Eyemart Express should remain alert for any unusual activity on their financial accounts and health insurance statements in the coming weeks and months as the situation continues to develop.
Consumers should also review any future notifications from the company carefully for additional instructions and available resources.








.webp)
.webp)
.webp)

.webp)
.webp)
.webp)
.webp)