Menulux Turkish POS Platform Allegedly Breached, Exposing 93,000 Customer Records
🧩 Standalone API Access Now Available
Access high-volume threat-intelligence data, automated ingestion endpoints, ransomware feeds, IOC data, and more.
View API AccessUnlock Exclusive Cyber Threat Intelligence
Powered by DarkWebInformer.com
Foundational access to breach intelligence. Track breaches, leaks, and threats in real time with high quality screenshots and concise expert summaries.
Continuously updated breach reports and threat summaries.
Daily breach, leak, and DDoS alerts.
Live tracking with JSON export.
Direct access to claims and posts.
Concise summaries of DDoS, defacements, and breaches.
Verified index of dark web sites and services.
Live status of 500+ sites.
Integrated checks inside breach posts.
Uncompressed, watermark free evidence.
Browser alerts for tracked terms.
Quick Facts
Incident Overview
A threat actor operating under the handle "888" claims to have breached Menulux, a Turkish point-of-sale (POS) platform. According to the post on BreachForums, the data breach occurred in January 2026 and resulted in the exposure of approximately 93,000 customer records. The threat actor states the compromised data includes full names, phone numbers, and physical addresses.
The leaked sample data shows Turkish customer records with fields including customer ID (KODU), customer number (MÜSTERİADI), phone number (TELEFON), mobile phone (CEPTELEFONU), email (EMAİL), address (ADRES), tax office (VERGİDAİRESİ), and tax number (VERGİNUMARASI). The addresses in the sample indicate customers from various Turkish cities including Istanbul neighborhoods such as Esenyurt, Küçükçekmece, and Bayrampaşa. The download is gated behind a points system on the forum.
This post is for subscribers on the Plus, Pro and Elite tiers
SubscribeAlready have an account? Sign In