Luxury Brand Data Breach 2025: Kering Confirms Hackers Stole Customer Data
Just a few days ago, a massive leak of user data was discovered in the luxury fashion houses of Gucci, Balenciaga, and Alexander McQueen that are part of the Kering group. As per the reports of the BBC and Reuters, the luxury brand data breach of 2025 is considered to be one of the most severe cases of hacking in the luxury retail sector this year.
It was stated by Kering that it came across unauthorized access to their system in June 2025; however, the disclosure of the breach was made on September 15, 2025. The “Shiny Hunters” hacker group has taken on the responsibility and mentioned that they have at their disposal 7.4 million unique email addresses.
What Was Stolen – and What Wasn’t
On the other hand, Kering verified the facts that the attackers managed to get access to the following information:
- Names of customers
- Emails of customers
- Contact phone numbers
- Mailing addresses
- Amounts spent by users in stores
The company went on to say that credit card numbers, bank details, and passwords had not been leaked. Customers in several countries are impacted by this, but Kering has not given any information about which nations these are.
Expert insight: “Luxury brands are sitting on the most valuable personal and spending data in the world,” says Dr. Marie Lefevre, a cybersecurity researcher at ESCP Paris. “This breach is just one of many in a broadening threat landscape for high-end retailers.”
Why the Kering Hack Matters for Luxury Retail
The Kering episode is a highlight of the trend where luxury brands are the targets of cybercriminals. Later in 2025, Richemont’s Cartier and LVMH’s Louis Vuitton both shared the news of their data leaks. Analysts suggest that the mixture of affluent clientele and a history of vast spending makes luxury customers an attractive hacker’s prize.
In such a context, the breach of Gucci customer data and the security incident at Balenciaga gain much importance. It indicates that even the giants of the industry who have large IT budgets cannot fully protect themselves against the smartest gone-well attacks.
Kering’s Response to the Cyberattack
Kering said it has:
Notified all necessary regulators and data protection authorities. Commenced the notification process for affected individuals as per EU GDPR and other regulations. Increased the internal control and strengthened the security of their network. The company is using the services of external cybersecurity specialists to delve into the breach’s scope and halt any possible future attacks.
What Customers Should Do Next
Cybersecurity experts suggest that luxury consumers:
- Do not fall for trick emails that pretend to be from Gucci, Balenciaga, or McQueen.
- Update the passwords for loyalty accounts or online shopping profiles.
- Go for multi-factor authentication wherever it can be set up.
- Keep an eye on credit reports and bank statements for any unusual activities.
It is worth highlighting that the above-mentioned measures are mandatory only because the perpetrators often utilize the stolen identities for the implementation of fake follow-up fraud schemes.
Recommended: Adidas Cyberattack: A Detailed Analysis of the 2025 Data Breach Incident
Quick Recap
The customer databases of fashion brands of the Kering group, such as Gucci, Balenciaga, and McQueen, have been hacked, and the records of millions of customers have been stolen.
Data such as names, email addresses, and total purchase amounts have been exposed, but no financial details have been compromised.
The “Shiny Hunters” made the announcement of their attack and its nature on September 15, 2025, thus taking responsibility for the incident.
Kering has already acted to secure its systems and is currently notifying the police and the individuals concerned.
The leak is a red flag that flies over the ongoing cybersecurity nightmare in the luxury fashion sector.
Recommended: The Salesloft Drift Breach: What Really Happened and How Salesforce Data Was Exposed
For deeper insights on agentic AI governance, identity controls, and real‑world breach data, visit Cyber Tech Insights.
To participate in upcoming interviews, please reach out to our CyberTech Media Room at sudipto@intentamplify.com.