Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Shiny Hunters breach Kering, exposing 7.4M Gucci, Balenciaga, and Alexander McQueen customer records

Attack mirrors a broader trend of cyber intrusions on luxury brands and uses Salesforce credential-stealing tactics flagged by Google.

byKerem Gülen
September 16, 2025
in Cybersecurity

In April, the cybercriminal group Shiny Hunters breached Kering, the French luxury conglomerate that owns brands like Gucci, Balenciaga, and Alexander McQueen.

The attack exposed the names, email addresses, phone numbers, addresses, and total spending amounts of customers worldwide. Kering has confirmed it refused to pay a Bitcoin ransom demanded by the group.

What customer data was stolen at Shiny Hunters breach?

The stolen data included personal contact information and detailed purchase histories but did not contain sensitive financial data. According to a Kering spokesperson, the breach involved temporary access to their systems.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

“In June, we identified that an unauthorized third party gained temporary access to our systems and accessed limited customer data from some of our Houses. No financial information – such as bank account numbers, credit card information, or government-issued identification numbers – was involved in the incident.”

Shiny Hunters claimed to have data associated with 7.4 million unique email addresses. To verify their claim, the group provided a small sample to the BBC, which contained thousands of genuine customer records.

The sample included a “Total Sales” field that documented how much individual customers had spent with each brand. Many customers in the sample had spent over $10,000, with some spending between $30,000 and $86,000. This type of information could be used to target high-value customers in future scams.

Kering’s response to the breach

Shiny Hunters informed the BBC that they first contacted Kering in early June to demand a ransom.

Kering refused to pay, following the advice of law enforcement agencies. After discovering the breach, the company notified the relevant data protection authorities and sent emails to all affected customers.

Under current regulations, Kering was not required to make a public statement about the incident.

Connection to a wider attack trend

The attack on Kering occurred around the same time other luxury brands, including Cartier and Louis Vuitton, reported their own data breaches. It is not clear if these incidents are connected.

In June, Google issued a warning about a series of attacks linked to Shiny Hunters, which Google tracks as UNC6040. The group’s tactics often involve tricking employees into giving up login credentials for internal Salesforce software to steal customer data.

Google confirmed it was also targeted by an attack using these same methods, indicating the group’s sophisticated and widespread operations.


Featured image credit

Tags: Alexander McQueenBalenciagaData BreachGucciKeringShiny Hunters

Related Posts

Researchers warn of 100K-node botnet exploiting Remote Desktop vulnerabilities

Researchers warn of 100K-node botnet exploiting Remote Desktop vulnerabilities

October 14, 2025
Microsoft Edge restricts IE mode after zero-day exploit

Microsoft Edge restricts IE mode after zero-day exploit

October 14, 2025
Verizon down: Latest Verizon outage map for service issues

Verizon down: Latest Verizon outage map for service issues

October 10, 2025
A critical Oracle zero-day flaw is being actively abused by hackers

A critical Oracle zero-day flaw is being actively abused by hackers

October 10, 2025
The Windows 10 doomsday clock is ticking for 500 million users

The Windows 10 doomsday clock is ticking for 500 million users

October 10, 2025
Hack an iPhone and Apple will pay you up to  million

Hack an iPhone and Apple will pay you up to $5 million

October 10, 2025

LATEST NEWS

NVTS stock skyrockets 27%: What is the correlation between Navitas and Nvidia

ChatGPT Android beta includes direct messaging

HP revealed a “League of Legends laptop” for $1,999

Samsung is not done with Bixby after all

Slack’s next-gen Slackbot aims to give “every employee AI superpowers”

Google integrates its viral Nano Banana AI into everyday tools

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.