Framework has been busyemailing customerswhose data has been leaked due to a recent phishing attack (h/tComputer Base). Personal Identifiable Information (PII) of Framework customers with outstanding balances for device purchases was shared by the firm’s primary external accounting partner, which fell victim to a phishing attack. Customers named in the leaked spreadsheets will receive the email reproduced in full at the above link. However, we are relieved to note that the leaked PII is claimed to consist solely of the following details: full name, email address, and the balance owed.

The well-regardedmodular laptopmaker has made the human errors behind the data leak and its full scope very clear. To ensure customers are fully informed, Framework has provided an incident timeline, discusses what has been done to resolve the issue, says how it will avoid any similar goofs in the future, and advises customers who were named in the leaked data.

Framework laptop

Framework’s data leak should provide another cautionary tale regarding cunning phishing attacks. According to the email shared on the Framework community forum, the firm’s primary external accounting partner received an email that they thought was from the Framework CEO on June 08, 2025. Social engineering tactics were used to obtain a spreadsheet that contained customer information. Luckily, the scope of the information was quite limited (as noted in the intro), with no passwords, payment methods, or other potentially sensitive data.

According to its customer communications, Framework’s reaction to the leak was pretty rapid. Within half an hour of the accountant responding to the attacker (on January 11), Framework’s Head of Finance was made aware of the breach. He informed the accountancy business of thesecurityerror and escalated the incident to Framework leadership. Subsequently, all affected customers were identified and notified with complete details about the leak.

Framework laptop

Lessons learned

Importantly, Framework plans to require employees at external consultants and service providers to havephishing and social engineeringattack training. Additionally, it will audit the training and operating procedures of such partners.

Because their data was shared with the attackers, customers who received the email mentioned above have been warned that the phishers could potentially try to impersonate Framework to gather sensitive information. Thus, concerned customers should verify any email that seems to be from Framework has arrived via the support@frame.work email address. Moreover, please remember that Framework will “never request payment information to be sent directly by email.” Customers can confirm the authenticity of any Framework communication via thecustomer supportportal if in doubt.

Mark Tyson

Last but not least, as well as being pleasantly transparent about the phishing incident, Framework has apologized to all customers affected.

Get Tom’s Hardware’s best news and in-depth reviews, straight to your inbox.

Mark Tyson is a news editor at Tom’s Hardware. He enjoys covering the full breadth of PC tech; from business and semiconductor design to products approaching the edge of reason.