Louis Vuitton Hacked - Attackers Stolen Customers Personal Data

According to Dior’s statement, the unauthorized third-party attackers successfully infiltrated Louis Vuitton’s UK operational systems through what security experts classify as a SQL injection or credential stuffing attack. While the company has implemented encryption protocols for financial data, the breach demonstrates vulnerabilities in their perimeter security and network segmentation. Cybersecurity analysts suggest the breach may have utilized advanced persistent threat (APT) techniques, allowing attackers to maintain lateral movement within the network for extended periods before detection. The attack, which occurred on July 2nd, represents a growing trend of sophisticated cyberattacks targeting high-end retail brands and their valuable customer databases. Louis Vuitton confirmed a July 2 data breach affecting UK customers, the third LVMH attack in three months. The company notified authorities, isolated systems, and strengthened security protocols, including multi-factor authentication. This breach is part of a broader pattern targeting luxury retailers, with Marks & Spencer, Co-op, and Harrods experiencing similar attacks. Security teams are implementing behavioral analytics and machine learning algorithms to detect anomalous access patterns and prevent future privilege escalation attempts. This follows similar attacks on M&S, Co-op, and Harrods, highlighting the need for enhanced cybersecurity in luxury retail. Recent arrests of four individuals, including a 17-year-old from the West Midlands, highlight the involvement of organized cybercrime groups utilizing botnets and credential harvesting techniques. The organization has deployed additional endpoint detection and response (EDR) solutions and strengthened its multi-factor authentication (MFA) protocols. Penetration testing and vulnerability assessments are now being conducted across all LVMH subsidiaries to identify potential attack surfaces.

This Cyber News was published on cybersecuritynews.com. Publication date: Mon, 14 Jul 2025 09:50:09 +0000


Cyber News related to Louis Vuitton Hacked - Attackers Stolen Customers Personal Data

Louis Vuitton says customers in Turkey, South Korea and UK impacted by data breaches | The Record from Recorded Future News - A statement from Louis Vuitton South Korea said the breach involved names, contact information and other data provided by customers. Luxury brand Louis Vuitton said data breaches at its stores in Turkey, South Korea and the United Kingdom exposed the ...
3 weeks ago Therecord.media Scattered Spider
Louis Vuitton says regional data breaches tied to same cyberattack - Luxury fashion giant Louis Vuitton confirmed that breaches impacting customers in the UK, South Korea, and Turkey stem from the same security incident, which is believed to be linked to the ShinyHunters extortion group. "Despite all security measures ...
3 weeks ago Bleepingcomputer.com Hunters
How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
10 months ago Aws.amazon.com
Louis Vuitton Hacked - Attackers Stolen Customers Personal Data - According to Dior’s statement, the unauthorized third-party attackers successfully infiltrated Louis Vuitton’s UK operational systems through what security experts classify as a SQL injection or credential stuffing attack. While the ...
3 weeks ago Cybersecuritynews.com
Dior begins sending data breach notifications to U.S. customers - The House of Dior (Dior) is sending data breach notifications to U.S. customers informing them that a May cybersecurity incident compromised their personal information. "Our investigation determined that an unauthorized party was able to gain ...
2 weeks ago Bleepingcomputer.com Hunters
Dior, a Louis Vuitton Brand, Alerts Customers Following Cyber Attack - The breach, discovered in May 2025, involved unauthorized access to customer databases containing personal data including names, addresses, dates of birth, and in some cases, Social Security numbers. Most concerning, the breach exposed passport ...
2 weeks ago Cybersecuritynews.com
Data De-Identification: Balancing Privacy, Efficacy & Cybersecurity - COMMENTARY. Global data privacy laws were created to address growing consumer concerns about individual privacy. These laws include several best practices for businesses about storing and using consumers' personal data so that the exposure of ...
1 year ago Darkreading.com
Identity Crisis: 14 Million Individuals at Risk After Mortgage Lender's Data Breach - Mr Cooper, the private mortgage lender, has now admitted almost 14.7 million individuals' private data has been stolen in a previous IT security breach, which resulted in the theft of their addresses and bank account numbers, but it is estimated the ...
1 year ago Cysecurity.news Meow
Privacy Policy 2024 - Personal information is any information that identifies you or would enable someone to contact you, which may include your name, email address, phone number and other non-public information that is associated with such information. Information We ...
1 year ago Bitsight.com
T-Mobile Hacked Again: 37 Million Customers Data Stolen - Security experts have sounded alarm bells again as the news surfaced that T-Mobile was hacked once again. This time, the personal data of around 37 million customers have been stolen by hackers. ...
2 years ago Grahamcluley.com
Ticketmaster confirms massive breach after stolen data for sale online - Live Nation has confirmed that Ticketmaster suffered a data breach after its data was stolen from a third-party cloud database provider, which is believed to be Snowflake. While the breach has allegedly exposed the data of over 560 million ...
1 year ago Bleepingcomputer.com Hunters
ID Theft Service Resold Access to USInfoSearch Data - One of the cybercrime underground's more active sellers of Social Security numbers, background and credit reports has been pulling data from hacked accounts at the U.S. consumer data broker USinfoSearch, KrebsOnSecurity has learned. Since at least ...
1 year ago Krebsonsecurity.com Hunters
T-Mobile Data Breach Affects 37 Million Customers: What You Should Know - T-Mobile recently announced that a data breach of its API had impacted the personal records of over 37 million customers. The breach occurred on the T-Mobile website, and could have allowed unauthorized users to access customer data such as name, ...
2 years ago Heimdalsecurity.com
Over 15,000 hacked Roku accounts sold for 50¢ each to buy hardware - Roku has disclosed a data breach impacting over 15,000 customers after hacked accounts were used to make fraudulent purchases of hardware and streaming subscriptions. BleepingComputer has learned there is more to this attack, with threat actors ...
1 year ago Bleepingcomputer.com
Data allegedly stolen in Ticketmaster hack - A group of hackers say they have stolen the personal details of 560 million Ticketmaster customers. ShinyHunters, the group claiming responsibility, says the stolen data includes names, addresses, phone numbers and partial credit card details from ...
1 year ago Packetstormsecurity.com Hunters
US SEC's X account hacked to announce fake Bitcoin ETF approval - The X account for the U.S. Securities and Exchange Commission was hacked today to issue a fake announcement on the approval of Bitcoin ETFs on security exchanges. The announcement came this afternoon in a now-deleted tweet from the SEC's hacked X ...
1 year ago Bleepingcomputer.com
Business Data Privacy Laws: Compliance and Beyond - Governments worldwide have implemented strict data privacy laws to protect individuals' information in the face of increasing cyber threats and data breaches. Let's dive into the world of business data privacy laws as we navigate the complexities of ...
1 year ago Securityzap.com
361 million stolen accounts leaked on Telegram added to HIBP - A massive trove of 361 million email addresses from credentials stolen by password-stealing malware, in credential stuffing attacks, and from data breaches was added to the Have I Been Pwned data breach notification service, allowing anyone to check ...
1 year ago Bleepingcomputer.com
FCC orders telecom carriers to report PII data breaches within 30 days - Starting March 13th, telecommunications companies must report data breaches impacting customers' personally identifiable information within 30 days, as required by FCC's updated data breach reporting requirements. FCC's final rule follows several ...
1 year ago Bleepingcomputer.com
Cooler Master confirms customer info stolen in data breach - Computer hardware manufacturer Cooler Master has confirmed that it suffered a data breach on May 19, allowing a threat actor to steal customer data. Cooler Master is a popular computer hardware manufacturer known for their cooling devices, computer ...
1 year ago Bleepingcomputer.com
'Sex life data' stolen from UK government among record number of ransomware attacks - Data on the sex lives of up to 10,000 people was stolen from a British government department in one of the record number of ransomware attacks to have hit Westminster in the first half of this year. It is not known which department the information ...
1 year ago Therecord.media
Cohesity partners with NVIDIA to harness the power of generative AI - Cohesity announced a collaboration with NVIDIA to help organizations safely unlock the power of generative AI and data using the recently announced NVIDIA NIM microservices and by integrating NVIDIA AI Enterprise into the Cohesity Gaia platform. ...
1 year ago Helpnetsecurity.com
Have I Been Pwned adds 71 million emails from Naz.API stolen account list - Have I Been Pwned has added almost 71 million email addresses associated with stolen accounts in the Naz.API dataset to its data breach notification service. The Naz.API dataset is a massive collection of 1 billion credentials compiled using ...
1 year ago Bleepingcomputer.com
Beyond DLP: Embracing a Multi-Layered Strategy for Personal Data Security - Data, especially personal data, drives the digital world. While digital systems continuously gather and use personal data to enhance user experience, there is a significant issue. The alarming frequency of data breaches indicates that the methods ...
1 year ago Securityboulevard.com
Innovative Legal Move Restores Hospital's Stolen Information - There has been a handover of patient data stolen by the notorious LockBit gang from a cloud computing company to a New York hospital alliance that is partnered with that company. There was a lawsuit filed by the North Star Health Alliance - a group ...
1 year ago Cysecurity.news LockBit