FindArticles FindArticles
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
FindArticlesFindArticles
Font ResizerAa
Search
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
Follow US
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
FindArticles © 2025. All Rights Reserved.
FindArticles > News > Technology

Gucci Owner Kering Falls Victim to ShinyHunters Cyberattack

Bill Thompson
Last updated: October 29, 2025 10:56 am
By Bill Thompson
Technology
7 Min Read
SHARE

Kering, the owner of Gucci, Balenciaga and Yves Saint Laurent, said that it had been a victim of the hacking collective ShinyHunters in an intrusion that compromised data related to its luxury houses. The incident is part of a broader campaign against companies that use cloud-based CRM platforms. Kering says it alerted authorities and affected parties, and that no banking or card information was compromised.

What Was Accessed, and How Many Were Affected

Data connected to about 7.4 million customers was compromised, according to reports cited by the company and BBC News coverage. Information that is exposed includes names, email addresses, phone numbers, physical addresses and spending/purchase details. Kering said that no payment card numbers, bank or government ID numbers, or in-store customer information details were compromised in the attack, and that mitigation steps have been put in place to limit additional impact on systems.

Table of Contents
  • What Was Accessed, and How Many Were Affected
  • A Supply-Chain Strike on CRM Infrastructure
  • Why Luxury Brands Are Especially Attractive Targets
  • Regulatory and Financial Exposure Facing Kering
  • What Customers Should Do Now to Protect Themselves
  • The Bigger Picture: ShinyHunters’ Playbook
A man in a black jacket and shirt stands against a background filled with various luxury brand logos, with a 16: 9 aspect ratio.

And because Kering does business across many brands and countries, such exposure includes shoppers of a variety of high-end labels — not just Gucci. The company said it has been notifying those affected and cooperating with regulators in places where notification is mandatory under privacy laws.

A Supply-Chain Strike on CRM Infrastructure

ShinyHunters has recently honed in on hacking data located within third-party software-as-a-service environments.

Here, the victim was customer data being held in a CRM system, with other reports linking other widely known companies as victims during that same period. The group allegedly breached the company’s systems in the spring, and weeks later tried to extort it over an online channel; Kering says it refused to pay and took steps to limit the breach.

These attacks highlight a structural challenge: Companies can harden their own networks but still be compromised through partners and vendors that handle sensitive data. Both identity and session management in SaaS ecosystems, including OAuth integrations and API tokens, have emerged as lucrative targets for criminal gangs looking to go big.

Why Luxury Brands Are Especially Attractive Targets

High-end retailers keep wealthy customer profiles — contact information, preferred stores and stylists, spending tiers — which they use to power the white-glove service. The same data, in the hands of criminals, powers customized phishing and account-takeover attacks. A convincing email that makes reference to a purchase or recent boutique visit is going to be much more successful in duping a customer into coughing up their credentials or one-time passcodes than a generic lure.

Recent attacks on other luxury houses, as well as peers of Kering in the jewelry and fashion world, indicate that attackers have increasingly set their sights on those with ample means whose accounts and loyalty points can be converted into money rapidly. Scammers can also pivot deeper into retail systems by targeting store associates and clienteling tools.

The Kering logo and name in raised, dark lettering on a textured, light brown stone wall, illuminated by sunlight casting shadows.

Regulatory and Financial Exposure Facing Kering

For a France-based conglomerate such as Kering, EU data protection regulators will likely examine timing and scope of notification as well as mitigation steps against the backdrop of EU rules that authorize fines of up to 4 percent of global annual revenue for serious infringements.

Regulators in Britain or other markets where its customers are based may also be involved. Class action activity is common post large retail exposures involving purchase histories.

The larger price is almost never merely technical. IBM’s latest Cost of a Data Breach Report put the global average incident cost in the multi-millions range, as response, legal fees, notification and customer churn all come into play. And, for luxury houses, there is reputational damage that can drag on VIP relationships that are disproportionately valuable to the bottom line.

What Customers Should Do Now to Protect Themselves

Impacted shoppers should be especially wary of unsolicited calls or emails that mention orders, repairs, or loyalty benefits. Don’t click links — access accounts by typing the brand’s website yourself, or opening the official app. Enable multifactor authentication if it’s offered, establish per-transaction alerts on payment cards and monitor statements for unauthorized charges. Take free credit monitoring if offered. Be extra wary of one-time code requests — banks and retailers don’t ask you to disclose OTPs over phone calls and emails.

The Bigger Picture: ShinyHunters’ Playbook

ShinyHunters is also well known for stealing massive amounts of data and then publicizing claims on breach forums and messaging channels in an effort to pressure victims into paying. The turn to stolen data in common business platforms is part of a broader shift that we are seeing across indicator-of-compromise (IOC) infrastructure: attackers go after identity and trusted third parties because it’s where the access — and the data — pools. Stolen credentials and supply-chain vulnerabilities consistently appear among the top breach enablers, according to industry reports — including those released each year by Verizon and ENISA.

Enterprises could have three or four key takeaways:

  • Treat SaaS environments and partner networks as an extension of your corporate network.
  • Document all those integrations.
  • Apply least-privileged access, conditional access and token lifecycle management checks for authentication services.
  • Monitor for unusual data export activity or logins that represent a change to normal behavior — and consider these risks before they happen.

For Kering and its peers, it will be just as important for brand equity as any runway show to shore up these controls.

Bill Thompson
ByBill Thompson
Bill Thompson is a veteran technology columnist and digital culture analyst with decades of experience reporting on the intersection of media, society, and the internet. His commentary has been featured across major publications and global broadcasters. Known for exploring the social impact of digital transformation, Bill writes with a focus on ethics, innovation, and the future of information.
Latest News
Microsoft to Invest $17.5B in India Through 2029
Google Prepares for First A.I. Glasses Launch
EU Begins Antitrust Probe Into Google AI Search
Amazon adds Alexa delivery tracking and gift guides for Amazon.com
TikTok Introduces Shared Feed in Direct Messages
Solawave offers Black Friday BOGO on light therapy devices
VSCO Lays Off 24 Employees Amid Consumer Slowdown
India Seeks AI Royalties From OpenAI and Google
Trump Signs Off on Nvidia H200 Sales to China With 25% Take
More Phones Add eSIM Support: Here’s How to Check Whether Yours Does
Motorola and Xiaomi Prepare AirTag Rivals
Pornhub 2025 Report: LGBTQ and MILF takeover is here
FindArticles
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
  • Corrections Policy
  • Diversity & Inclusion Statement
  • Diversity in Our Team
  • Editorial Guidelines
  • Feedback & Editorial Contact Policy
FindArticles © 2025. All Rights Reserved.