Cyber attacks in the luxury retail sector: legal insights and practical steps for building resilience

This website will offer limited functionality in this browser. We only support the recent versions of major browsers like Chrome, Firefox, Safari, and Edge.
Background
The luxury retail sector has become an increasingly attractive target for sophisticated cyber attacks, with several high-profile brands experiencing data breaches in the past year. The recent data breach affecting Kering, the French parent company of Gucci, Balenciaga and Alexander McQueen, has once again highlighted the persistent cyber risks facing luxury retailers.
This incident is the latest in a series of cyber attacks targeting luxury brands and other retailers such as the recent Jaguar Land Rover incident. Similar breaches have occurred at Richemont’s Cartier and several labels under LVMH (Louis Vuitton, Christian Dior and Tiffany), including a July 2025 leak affecting approximately 419,000 customers of Louis Vuitton.
This article focusses on key lessons and practical steps businesses can take to build resilience and mitigate the risk of becoming the latest victim of a cyber attack.
The evolving threat landscape
Luxury brands are especially vulnerable to cyber attacks. Attackers are often motivated by the potential to access valuable customer data given the nature of the customers luxury brands serve. An analysis by the BBC of compromised data in the Kering breach reveals that some customers made purchases exceeding $10,000, with a few spending between $30,000 and $86,000. These high net-worth individuals are particularly vulnerable to secondary hacks and scams, including phishing attacks or identity fraud.
While financial data is not always compromised, the exposure of personal and transactional information still presents significant risks, including targeted scams and reputational harm to the brands.
Cyber attacks targeting luxury retailers have become increasingly organised, sophisticated and AI-powered.
According to reports, the Kering attack was attributed to a group known as “Shiny Hunters.” Whilst Kering has not disclosed the exact method used to access their systems, Google’s cyber security analysts have linked “Shiny Hunters” to a broader threat actor, UNC6040, which is known for targeting enterprise third-party software systems by tricking employees into surrendering login credentials.
Building resilience: practical steps to protect your organisation
The recent surge in cyber attacks in luxury retail is a clear reminder that no organisation is immune to modern cyber threats. These incidents show that cyber security is no longer just an IT issue but a critical business risk that can damage a brand’s reputation and bottom line.
In today’s threat landscape, resilience must be understood as distinct from, and more than mere prevention; it is about ensuring the capacity to respond swiftly and effectively when - not if - a breach occurs.
While the specifics of each incident may differ, the lessons for organisations handling customer data are fairly consistent. Notably, several breaches have involved vulnerabilities within the software systems of third-party service providers, underscoring the importance of robust due diligence and ongoing audit and oversight of external partners.
Below are some key practical steps businesses can take to build resilience and mitigate the risk of recurring breaches:
Comment
The evolving cyber threat landscape requires ongoing vigilance, continuous improvement and investment (both in terms of time and money). By embedding strong governance alongside robust technical measures, luxury retailers can better protect their customers’ data, maintain trust, and safeguard their reputation in an increasingly challenging threat landscape.
For advice on how to protect your organisation and build resilience against cyber attacks, please contact Martin Cook, Madelin Sinclair McAusland, Amanda Leiu, Justin Barrow or a member of Burges Salmon's Commercial & Technology team.
This article was written by Fraser Campbell and Amanda Leiu.