Art Basel's VIP visitor data compromised in cyber attack on parent company MCH Group
A cyber attack on Art Basel's parent company MCH Group has potentially exposed personal contact details of thousands of the art fair's VIP visitors. The malware infection occurred two weeks ago, prompting an urgent investigation involving the Swiss National Cyber Security Centre and Swiss police. MCH Group stated that perpetrators may have accessed personal contact data, though the full extent of the breach remains unknown and is being analyzed with cybersecurity experts. This incident follows a pattern of gallery-targeted cyber fraud, including a 2017 scheme that affected dealers Hauser & Wirth, Simon Lee, Thomas Dane, and Rosenfeld Porcini through email monitoring and invoice manipulation. The Art Basel database could provide fraudsters with valuable email addresses for phishing attempts. A special hotline has been established for suspicious correspondence at cyberhotline@mch-group.com or +41 58 206 26 66.
Key facts
- Art Basel experienced a cyber attack potentially exposing VIP visitor personal details
- The attack occurred two weeks ago via malware on MCH Group servers
- Swiss National Cyber Security Centre and Swiss police are investigating
- Personal contact details may have been accessed by perpetrators
- The full extent of the data breach remains unknown
- Similar gallery cyber fraud occurred in 2017 affecting multiple dealers
- Art Basel has established a special hotline for suspicious correspondence
- The attack could enable phishing attempts using the compromised database
Entities
Institutions
- Art Basel
- MCH Group
- Swiss National Cyber Security Centre
- Hauser & Wirth
- Simon Lee
- Thomas Dane
- Rosenfeld Porcini
- artreview.com
Locations
- Switzerland