Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers stole millions of Users’ Personal Data from Gucci, Balenciaga, and Alexander McQueen Stores

Hackers stole millions of Users’ Personal Data from Gucci, Balenciaga, and Alexander McQueen Stores

Posted on September 16, 2025September 16, 2025 By CWS

Luxurious vogue firm Kering has confirmed a knowledge exfiltration incident wherein menace actor Shiny Hunters accessed non-public buyer information for Gucci, Balenciaga, and Alexander McQueen.

The breach, detected in June however occurring in April, uncovered personally identifiable data (PII) for an estimated 7.4 million distinctive e-mail addresses.

Key Takeaways1. PII and spend knowledge of ~7.4 M luxury-brand prospects stolen.2. Excessive-value consumers face elevated phishing and SIM-swap dangers.3. Kering notified regulators/prospects, refused ransom.

Huge Information Exfiltration 

In line with Kering’s assertion, the attacker gained short-term unauthorized entry by way of compromised inside credentials—probably harvested by a phishing marketing campaign focusing on Salesforce SSO portals. 

The stolen dataset accommodates:

E-mail

Full identify

Telephone quantity

Delivery deal with

Complete gross sales

No PCI-DSS-regulated knowledge, corresponding to bank card numbers or checking account particulars, was exfiltrated. As a substitute, the information embrace names, e-mail addresses, cellphone numbers, transport addresses, and a “Complete Gross sales” area indicating every buyer’s cumulative spending. 

Evaluation of a proof-of-concept pattern revealed spend tiers starting from $10,000 to $86,000 per particular person, heightening considerations over focused whaling and spear-phishing.

Kering has notified related knowledge safety authorities beneath GDPR Article 33 and communicated instantly with affected prospects by way of e-mail. 

Beneath EU laws, companies want solely publicly disclose breaches if the incident poses a excessive danger to knowledge topics—Kering maintains its direct notification obligations have been met.

Shiny Hunters’ Ransom Calls for 

BBC experiences that the attacker, self-identified as Shiny Hunters, claimed to have negotiated a ransom in Bitcoin (BTC) with Kering starting in June by way of Telegram. 

Kering denies any paid negotiations and confirms adherence to law-enforcement steering to refuse ransom funds.

In parallel, Google’s Menace Evaluation Group attributes an analogous marketing campaign tracked as UNC6040 to Shiny Hunters, noting exploitation of stolen API tokens and misuse of OAuth scopes to reap credentials from different main companies. 

This sample underscores evolving TTPs (Ways, Methods, and Procedures), together with:

Credential theft by way of social engineering

Abuse of third-party CRM integrations

Exfiltration by encrypted channels 

Safety specialists warn that leaked PII mixed with buyer spend profiles might facilitate secondary intrusions—corresponding to account takeover or SIM swapping, particularly in opposition to high-value targets.

Victims ought to assume scammers could impersonate legit organizations utilizing stolen PII. Beneficial mitigations embrace:

Allow multi-factor authentication (MFA) on all accounts.

Use distinctive, randomly generated passwords (e.g., passphrases of three random phrases).

Monitor credit score experiences and arrange alerts for suspicious exercise.

The NCSC advises resetting passwords and reviewing account restoration settings for all e-mail and e-commerce profiles. Remaining vigilant in opposition to unsolicited calls or emails demanding pressing motion will help thwart follow-on fraud.

Free reside webinar on new malware techniques from our analysts! Study superior detection strategies -> Register for Free

Cyber Security News Tags:Alexander, Balenciaga, Data, Gucci, Hackers, McQueen, Millions, Personal, Stole, Stores, Users

Post navigation

Previous Post: Chaos Mesh Critical GraphQL Flaws Enable RCE and Full Kubernetes Cluster Takeover
Next Post: OpenSSL Conference 2025

Related Posts

Dark Partners Hackers Group Wiping Crypto Wallets With Fake Ai Tools and VPN Services Dark Partners Hackers Group Wiping Crypto Wallets With Fake Ai Tools and VPN Services Cyber Security News
GitLab Releases Critical Security Updates to Fix Vulnerabilities GitLab Releases Critical Security Updates to Fix Vulnerabilities Cyber Security News
10 Best Data Loss Prevention Software in 2025 10 Best Data Loss Prevention Software in 2025 Cyber Security News
Wikipedia Lost Legal Battle Against The UK’s Online Safety ACT Regulations Wikipedia Lost Legal Battle Against The UK’s Online Safety ACT Regulations Cyber Security News
Microsoft Details Defence Techniques Against Indirect Prompt Injection Attacks Microsoft Details Defence Techniques Against Indirect Prompt Injection Attacks Cyber Security News
MacOS Users Targeted by Malvertising with Malext Infostealer MacOS Users Targeted by Malvertising with Malext Infostealer Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark