Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers stole millions of Users’ Personal Data from Gucci, Balenciaga, and Alexander McQueen Stores

Posted on September 16, 2025September 16, 2025 By CWS

Luxurious vogue firm Kering has confirmed a knowledge exfiltration incident wherein menace actor Shiny Hunters accessed non-public buyer information for Gucci, Balenciaga, and Alexander McQueen.

The breach, detected in June however occurring in April, uncovered personally identifiable data (PII) for an estimated 7.4 million distinctive e-mail addresses.

Key Takeaways1. PII and spend knowledge of ~7.4 M luxury-brand prospects stolen.2. Excessive-value consumers face elevated phishing and SIM-swap dangers.3. Kering notified regulators/prospects, refused ransom.

Huge Information Exfiltration 

In line with Kering’s assertion, the attacker gained short-term unauthorized entry by way of compromised inside credentials—probably harvested by a phishing marketing campaign focusing on Salesforce SSO portals. 

The stolen dataset accommodates:

E-mail

Full identify

Telephone quantity

Delivery deal with

Complete gross sales

No PCI-DSS-regulated knowledge, corresponding to bank card numbers or checking account particulars, was exfiltrated. As a substitute, the information embrace names, e-mail addresses, cellphone numbers, transport addresses, and a “Complete Gross sales” area indicating every buyer’s cumulative spending. 

Evaluation of a proof-of-concept pattern revealed spend tiers starting from $10,000 to $86,000 per particular person, heightening considerations over focused whaling and spear-phishing.

Kering has notified related knowledge safety authorities beneath GDPR Article 33 and communicated instantly with affected prospects by way of e-mail. 

Beneath EU laws, companies want solely publicly disclose breaches if the incident poses a excessive danger to knowledge topics—Kering maintains its direct notification obligations have been met.

Shiny Hunters’ Ransom Calls for 

BBC experiences that the attacker, self-identified as Shiny Hunters, claimed to have negotiated a ransom in Bitcoin (BTC) with Kering starting in June by way of Telegram. 

Kering denies any paid negotiations and confirms adherence to law-enforcement steering to refuse ransom funds.

In parallel, Google’s Menace Evaluation Group attributes an analogous marketing campaign tracked as UNC6040 to Shiny Hunters, noting exploitation of stolen API tokens and misuse of OAuth scopes to reap credentials from different main companies. 

This sample underscores evolving TTPs (Ways, Methods, and Procedures), together with:

Credential theft by way of social engineering

Abuse of third-party CRM integrations

Exfiltration by encrypted channels 

Safety specialists warn that leaked PII mixed with buyer spend profiles might facilitate secondary intrusions—corresponding to account takeover or SIM swapping, particularly in opposition to high-value targets.

Victims ought to assume scammers could impersonate legit organizations utilizing stolen PII. Beneficial mitigations embrace:

Allow multi-factor authentication (MFA) on all accounts.

Use distinctive, randomly generated passwords (e.g., passphrases of three random phrases).

Monitor credit score experiences and arrange alerts for suspicious exercise.

The NCSC advises resetting passwords and reviewing account restoration settings for all e-mail and e-commerce profiles. Remaining vigilant in opposition to unsolicited calls or emails demanding pressing motion will help thwart follow-on fraud.

Free reside webinar on new malware techniques from our analysts! Study superior detection strategies -> Register for Free

Cyber Security News Tags:Alexander, Balenciaga, Data, Gucci, Hackers, McQueen, Millions, Personal, Stole, Stores, Users

Post navigation

Previous Post: Chaos Mesh Critical GraphQL Flaws Enable RCE and Full Kubernetes Cluster Takeover
Next Post: OpenSSL Conference 2025

Related Posts

Weaponized Chrome Extension Affects 1.7 Million Users Despite Google’s Verified Badges Cyber Security News
ClickFix Malware Attacks macOS Users to Steal Login Credentials Cyber Security News
Microsoft 365 Direct Send Weaponized to Bypass Email Security Defenses Cyber Security News
Threat Hunting 101 Proactive Strategies for Technical Teams Cyber Security News
Farmers Insurance Cyber Attack – 1.1 Million Customers Data Exposed in Salesforce Attack Cyber Security News
PoC Exploit Released for CrushFTP 0-day Vulnerability (CVE-2025-54309) Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Check Point to Acquire AI Security Firm Lakera
  • OpenSSL Conference 2025
  • Hackers stole millions of Users’ Personal Data from Gucci, Balenciaga, and Alexander McQueen Stores
  • Chaos Mesh Critical GraphQL Flaws Enable RCE and Full Kubernetes Cluster Takeover
  • Seraphic Browser-Native Protection Now Available for Purchase on the CrowdStrike Marketplace

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Check Point to Acquire AI Security Firm Lakera
  • OpenSSL Conference 2025
  • Hackers stole millions of Users’ Personal Data from Gucci, Balenciaga, and Alexander McQueen Stores
  • Chaos Mesh Critical GraphQL Flaws Enable RCE and Full Kubernetes Cluster Takeover
  • Seraphic Browser-Native Protection Now Available for Purchase on the CrowdStrike Marketplace

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News