Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers stole millions of Users’ Personal Data from Gucci, Balenciaga, and Alexander McQueen Stores

Hackers stole millions of Users’ Personal Data from Gucci, Balenciaga, and Alexander McQueen Stores

Posted on September 16, 2025September 16, 2025 By CWS

Luxurious vogue firm Kering has confirmed a knowledge exfiltration incident wherein menace actor Shiny Hunters accessed non-public buyer information for Gucci, Balenciaga, and Alexander McQueen.

The breach, detected in June however occurring in April, uncovered personally identifiable data (PII) for an estimated 7.4 million distinctive e-mail addresses.

Key Takeaways1. PII and spend knowledge of ~7.4 M luxury-brand prospects stolen.2. Excessive-value consumers face elevated phishing and SIM-swap dangers.3. Kering notified regulators/prospects, refused ransom.

Huge Information Exfiltration 

In line with Kering’s assertion, the attacker gained short-term unauthorized entry by way of compromised inside credentials—probably harvested by a phishing marketing campaign focusing on Salesforce SSO portals. 

The stolen dataset accommodates:

E-mail

Full identify

Telephone quantity

Delivery deal with

Complete gross sales

No PCI-DSS-regulated knowledge, corresponding to bank card numbers or checking account particulars, was exfiltrated. As a substitute, the information embrace names, e-mail addresses, cellphone numbers, transport addresses, and a “Complete Gross sales” area indicating every buyer’s cumulative spending. 

Evaluation of a proof-of-concept pattern revealed spend tiers starting from $10,000 to $86,000 per particular person, heightening considerations over focused whaling and spear-phishing.

Kering has notified related knowledge safety authorities beneath GDPR Article 33 and communicated instantly with affected prospects by way of e-mail. 

Beneath EU laws, companies want solely publicly disclose breaches if the incident poses a excessive danger to knowledge topics—Kering maintains its direct notification obligations have been met.

Shiny Hunters’ Ransom Calls for 

BBC experiences that the attacker, self-identified as Shiny Hunters, claimed to have negotiated a ransom in Bitcoin (BTC) with Kering starting in June by way of Telegram. 

Kering denies any paid negotiations and confirms adherence to law-enforcement steering to refuse ransom funds.

In parallel, Google’s Menace Evaluation Group attributes an analogous marketing campaign tracked as UNC6040 to Shiny Hunters, noting exploitation of stolen API tokens and misuse of OAuth scopes to reap credentials from different main companies. 

This sample underscores evolving TTPs (Ways, Methods, and Procedures), together with:

Credential theft by way of social engineering

Abuse of third-party CRM integrations

Exfiltration by encrypted channels 

Safety specialists warn that leaked PII mixed with buyer spend profiles might facilitate secondary intrusions—corresponding to account takeover or SIM swapping, particularly in opposition to high-value targets.

Victims ought to assume scammers could impersonate legit organizations utilizing stolen PII. Beneficial mitigations embrace:

Allow multi-factor authentication (MFA) on all accounts.

Use distinctive, randomly generated passwords (e.g., passphrases of three random phrases).

Monitor credit score experiences and arrange alerts for suspicious exercise.

The NCSC advises resetting passwords and reviewing account restoration settings for all e-mail and e-commerce profiles. Remaining vigilant in opposition to unsolicited calls or emails demanding pressing motion will help thwart follow-on fraud.

Free reside webinar on new malware techniques from our analysts! Study superior detection strategies -> Register for Free

Cyber Security News Tags:Alexander, Balenciaga, Data, Gucci, Hackers, McQueen, Millions, Personal, Stole, Stores, Users

Post navigation

Previous Post: Chaos Mesh Critical GraphQL Flaws Enable RCE and Full Kubernetes Cluster Takeover
Next Post: OpenSSL Conference 2025

Related Posts

Adobe Acrobat Reader Vulnerabilities let Attackers Execute Arbitrary Code and Bypass Security Adobe Acrobat Reader Vulnerabilities let Attackers Execute Arbitrary Code and Bypass Security Cyber Security News
Staying Ahead Of The Curve With A Temporary Email Address Staying Ahead Of The Curve With A Temporary Email Address Cyber Security News
New Wonderland Android Malware with Bidirectional SMS-Stealing Capabilities Stealing OTPs New Wonderland Android Malware with Bidirectional SMS-Stealing Capabilities Stealing OTPs Cyber Security News
Ransomware Gangs Actively Expanding to Attack VMware and Linux Systems Ransomware Gangs Actively Expanding to Attack VMware and Linux Systems Cyber Security News
Gemini CLI to Your Kali Linux Terminal To Automate Penetration Testing Tasks Gemini CLI to Your Kali Linux Terminal To Automate Penetration Testing Tasks Cyber Security News
Why Cross-Training in Networking and Cybersecurity Matters Why Cross-Training in Networking and Cybersecurity Matters Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • APT28 Exploits Microsoft Office Flaw Targeting Europe
  • Critical n8n Vulnerability Allows System Commands Execution
  • DNS TXT Records Exploited in Advanced Cyber Attacks
  • NGINX Vulnerability Exploited in Web Traffic Hijacking
  • New Malvertising Threat Exploits Facebook Ads for Scams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • APT28 Exploits Microsoft Office Flaw Targeting Europe
  • Critical n8n Vulnerability Allows System Commands Execution
  • DNS TXT Records Exploited in Advanced Cyber Attacks
  • NGINX Vulnerability Exploited in Web Traffic Hijacking
  • New Malvertising Threat Exploits Facebook Ads for Scams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark