Hello Cake Data Breach Exposes Protected Health Information

Published
September 21, 2025
Updated
September 23, 2025
Hello Cake Data Breach Exposes Protected Health Information
Hello Cake
Types of INFORMATION affected
  • Names
    Names
  • Social security numbers
    Social Security Numbers
  • Dates of birth
    Dates of Birth
  • Addresses
    Addresses
  • Government IDs
    Government IDs
  • Medical Information
    Medical Info
  • Financial Info
    Financial Info

Affected by the

Hello Cake

data breach?

Join the Lawsuit

It's free to join. 

Banner advertisement for ExpressVPN to take control of your online security

Claim Depot may receieve a commission from links on this page

On July 25, 2025, Hello Cake, a sexual wellness company based in North Hollywood, Calif., experienced a significant data breach involving sensitive customer information.

The breach stemmed from a misconfigured access setting on a single file stored in a cloud-based system during a routine platform migration. This file, which contained personal and prescription-related information, was accessible only via its exact internet address (direct file path) and was not searchable or browsable online. However, an unauthorized third party accessed and copied the file, as determined during an internal investigation completed on Aug. 22, 2025.

The compromised data included a range of personally identifiable information (PII) and protected health information (PHI): full names, dates of birth, email addresses, phone numbers, order IDs, transaction IDs, shipping addresses, prescribed medication names, prescription identifiers, prescription expiration dates, prescription refills, prices, order statuses, shipping dates, discount and coupon information, and other order-related data.

The threat actor known as “888” claimed responsibility for the breach, posting details and samples of the stolen data on the open web on July 21, 2025. The incident impacted customers who used Hello Cake’s telehealth prescription services, which are provided in partnership with M&D Integrations Inc. (MDI). The breach was limited to information shared for prescription consultations and fulfillment, and did not affect MDI’s systems or other Hello Cake files.

Hello Cake reported the breach to the California Attorney General and to the Montana Attorney General on Sept. 19, 2025. According to the Montana AG disclosure, 50 residents of the state have been affected.

Hello Cake's response

Upon discovering the misconfigured file access, Hello Cake acted to remove the file from their system and correct the security settings. The company launched an internal review and engaged third-party cybersecurity experts to investigate the scope and impact of the incident. Their investigation confirmed that only one file was affected, no other systems were accessed, and the incident was isolated to the cloud storage platform.

Hello Cake has since implemented additional safeguards to prevent similar incidents in the future. They have offered detailed guidance to affected individuals, including steps for monitoring credit reports, placing fraud alerts, and freezing credit files. The company has established a dedicated incident response phone line at 866-291-1599, available Monday through Friday from 8 a.m. to 5:30 p.m. Central Time, to assist those with questions or concerns.

Given the nature of the breach, where access was possible only via the exact file path and no financial data was involved, the risk of direct financial fraud is reduced. However, because exposed data includes both PII and PHI, affected individuals should remain vigilant for signs of identity theft or fraud. It is advisable to regularly review account statements, monitor credit reports for unauthorized activity, and promptly report any suspicious activity to financial institutions or law enforcement.

Protect Your Data

A breach notice means your personal details could be circulating far beyond the organization involved. One practical step is continuous monitoring: services such as Identity Defender (included with an ExpressVPN subscription) can automatically check dark-web markets, flag new credit-file activity, and request removal of your information from data-broker sites.

This kind of “early-warning system” can’t undo a breach, but it can help you spot misuse quickly and limit further exposure. ExpressVPN is offering 61% off, risk-free for 30 days, with ID Theft Insurance included and no extra cost for those who sign up for one or two years.

Notice Letter

This browser does not support inline PDFs. Please download the PDF to view it: Download PDF

CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image