Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers stole millions of Users’ Personal Data from Gucci, Balenciaga, and Alexander McQueen Stores

Posted on September 16, 2025September 16, 2025 By CWS

Luxurious vogue firm Kering has confirmed a knowledge exfiltration incident wherein menace actor Shiny Hunters accessed non-public buyer information for Gucci, Balenciaga, and Alexander McQueen.

The breach, detected in June however occurring in April, uncovered personally identifiable data (PII) for an estimated 7.4 million distinctive e-mail addresses.

Key Takeaways1. PII and spend knowledge of ~7.4 M luxury-brand prospects stolen.2. Excessive-value consumers face elevated phishing and SIM-swap dangers.3. Kering notified regulators/prospects, refused ransom.

Huge Information Exfiltration 

In line with Kering’s assertion, the attacker gained short-term unauthorized entry by way of compromised inside credentials—probably harvested by a phishing marketing campaign focusing on Salesforce SSO portals. 

The stolen dataset accommodates:

E-mail

Full identify

Telephone quantity

Delivery deal with

Complete gross sales

No PCI-DSS-regulated knowledge, corresponding to bank card numbers or checking account particulars, was exfiltrated. As a substitute, the information embrace names, e-mail addresses, cellphone numbers, transport addresses, and a “Complete Gross sales” area indicating every buyer’s cumulative spending. 

Evaluation of a proof-of-concept pattern revealed spend tiers starting from $10,000 to $86,000 per particular person, heightening considerations over focused whaling and spear-phishing.

Kering has notified related knowledge safety authorities beneath GDPR Article 33 and communicated instantly with affected prospects by way of e-mail. 

Beneath EU laws, companies want solely publicly disclose breaches if the incident poses a excessive danger to knowledge topics—Kering maintains its direct notification obligations have been met.

Shiny Hunters’ Ransom Calls for 

BBC experiences that the attacker, self-identified as Shiny Hunters, claimed to have negotiated a ransom in Bitcoin (BTC) with Kering starting in June by way of Telegram. 

Kering denies any paid negotiations and confirms adherence to law-enforcement steering to refuse ransom funds.

In parallel, Google’s Menace Evaluation Group attributes an analogous marketing campaign tracked as UNC6040 to Shiny Hunters, noting exploitation of stolen API tokens and misuse of OAuth scopes to reap credentials from different main companies. 

This sample underscores evolving TTPs (Ways, Methods, and Procedures), together with:

Credential theft by way of social engineering

Abuse of third-party CRM integrations

Exfiltration by encrypted channels 

Safety specialists warn that leaked PII mixed with buyer spend profiles might facilitate secondary intrusions—corresponding to account takeover or SIM swapping, particularly in opposition to high-value targets.

Victims ought to assume scammers could impersonate legit organizations utilizing stolen PII. Beneficial mitigations embrace:

Allow multi-factor authentication (MFA) on all accounts.

Use distinctive, randomly generated passwords (e.g., passphrases of three random phrases).

Monitor credit score experiences and arrange alerts for suspicious exercise.

The NCSC advises resetting passwords and reviewing account restoration settings for all e-mail and e-commerce profiles. Remaining vigilant in opposition to unsolicited calls or emails demanding pressing motion will help thwart follow-on fraud.

Free reside webinar on new malware techniques from our analysts! Study superior detection strategies -> Register for Free

Cyber Security News Tags:Alexander, Balenciaga, Data, Gucci, Hackers, McQueen, Millions, Personal, Stole, Stores, Users

Post navigation

Previous Post: Chaos Mesh Critical GraphQL Flaws Enable RCE and Full Kubernetes Cluster Takeover
Next Post: OpenSSL Conference 2025

Related Posts

Threat Actors Advertising Anivia Stealer Malware on Dark Web Bypassing UAC Controls Cyber Security News
AI Vibe Coding Platform Hacked Cyber Security News
New North Korean IT Worker With Innocent Job Application Get Access to Organization’s Network Cyber Security News
DarkCloud Stealer Attacking Financial Companies With Weaponized RAR Attachments Cyber Security News
Search Engines are Indexing ChatGPT Conversations! Cyber Security News
New Windows-Based Airstalk Malware Employs Multi-Threaded C2 Communication to Steal Logins Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New EDR-Redir V2 Blinds Windows Defender on Windows 11 With Fake Program Files
  • OpenAI’s New Aardvark GPT-5 Agent that Detects and Fixes Vulnerabilities Automatically
  • ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability
  • How Malicious AI Hijacks Victim Agents
  • Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New EDR-Redir V2 Blinds Windows Defender on Windows 11 With Fake Program Files
  • OpenAI’s New Aardvark GPT-5 Agent that Detects and Fixes Vulnerabilities Automatically
  • ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability
  • How Malicious AI Hijacks Victim Agents
  • Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News