{
	"id": "2cad0a12-6f01-4c18-9a5e-d13a7406c37e",
	"created_at": "2026-04-06T01:32:13.493489Z",
	"updated_at": "2026-04-10T03:34:59.506223Z",
	"deleted_at": null,
	"sha1_hash": "5f9c4e7ce8bec8ba44531f18b0160a4332e28d0f",
	"title": "Dior begins sending data breach notifications to U.S. customers",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 2188805,
	"plain_text": "Dior begins sending data breach notifications to U.S. customers\r\nBy Bill Toulas\r\nPublished: 2025-07-21 · Archived: 2026-04-06 00:26:56 UTC\r\nThe House of Dior (Dior) is sending data breach notifications to U.S. customers informing them that a May cybersecurity\r\nincident compromised their personal information.\r\nDior is a French luxury fashion house, part of the LVMH (Moët Hennessy Louis Vuitton) group, which is the world's largest\r\nluxury conglomerate.\r\nThe Dior brand alone generates an annual revenue of over $12 billion, operating hundreds of boutiques worldwide.\r\nhttps://www.bleepingcomputer.com/news/security/dior-begins-sending-data-breach-notifications-to-us-customers/\r\nPage 1 of 4\n\n0:00\r\nhttps://www.bleepingcomputer.com/news/security/dior-begins-sending-data-breach-notifications-to-us-customers/\r\nPage 2 of 4\n\nVisit Advertiser websiteGO TO PAGE\r\nThe security incident occurred on January 26, 2025, but the company only became aware of it on May 7, 2025, launching\r\ninternal investigations to determine its scope and impact.\r\n\"Our investigation determined that an unauthorized party was able to gain access to a Dior database that contained\r\ninformation about Dior clients on January 26, 2025,\" reads the notice sent to affected individuals.\r\n\"Dior promptly took steps to contain the incident, and we have no evidence of subsequent unauthorized access to Dior\r\nsystems.\"\r\nBased on the findings of the investigation, the following information has been exposed:\r\nFull names\r\nContact details\r\nPhysical address\r\nDate of birth\r\nPassport or government ID number (in some cases)\r\nSocial Security Number (in some cases)\r\nThe company clarifies that no payment details, such as bank account or payment card information, were contained in the\r\ncompromised database, so this information remains safe.\r\nLaw enforcement was notified accordingly, while third-party cybersecurity experts were engaged to help contain the\r\nincident.\r\nRecipients of the data breach notification are advised to remain vigilant for scams and phishing attempts, and to closely\r\nmonitor the activity in their financial accounts to identify and report any suspicious activity.\r\nMeanwhile, the letter encloses instructions on enrolling in a 24-month credit monitoring and identity theft protection\r\npackage free of charge, redeemable until October 31, 2025.\r\nThe date of the incident matches that of a previous disclosure by Dior, which confirmed impact in South Korea and China.\r\nLouis Vuitton, also a brand of the LVMH group, recently disclosed a data breach that impacted customers in the UK, South\r\nKorea, and Turkey.\r\nAlthough a spokesperson for the firm didn't respond to our requests for clarification, BleepingComputer learned that the\r\nincidents at Louis Vuitton and Dior were part of the same cyberattack.\r\nThe attack is believed to be linked to the ShinyHunters extortion group, which gained access to LVMH customer\r\ninformation by breaching a third-party vendor's database.\r\nIf that is the case, Louis Vuitton is likely to follow with a similar disclosure concerning U.S. customers.\r\nBleepingComputer has contacted Dior to learn how many U.S. customers were impacted, but we have not yet received a\r\nresponse.\r\nhttps://www.bleepingcomputer.com/news/security/dior-begins-sending-data-breach-notifications-to-us-customers/\r\nPage 3 of 4\n\nAutomated Pentesting Covers Only 1 of 6 Surfaces.\r\nAutomated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the\r\nother.\r\nThis whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic\r\nquestions for any tool evaluation.\r\nSource: https://www.bleepingcomputer.com/news/security/dior-begins-sending-data-breach-notifications-to-us-customers/\r\nhttps://www.bleepingcomputer.com/news/security/dior-begins-sending-data-breach-notifications-to-us-customers/\r\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://www.bleepingcomputer.com/news/security/dior-begins-sending-data-breach-notifications-to-us-customers/"
	],
	"report_names": [
		"dior-begins-sending-data-breach-notifications-to-us-customers"
	],
	"threat_actors": [
		{
			"id": "c071c8cd-f854-4bad-b28f-0c59346ec348",
			"created_at": "2023-11-08T02:00:07.132524Z",
			"updated_at": "2026-04-10T02:00:03.422366Z",
			"deleted_at": null,
			"main_name": "ShinyHunters",
			"aliases": [],
			"source_name": "MISPGALAXY:ShinyHunters",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "6f7f2ed5-f30d-4a99-ab2d-f596c1d413b2",
			"created_at": "2025-10-24T02:04:50.086223Z",
			"updated_at": "2026-04-10T02:00:03.770068Z",
			"deleted_at": null,
			"main_name": "GOLD CRYSTAL",
			"aliases": [
				"Scattered LAPSUS$ Hunters",
				"ShinyCorp",
				"ShinyHunters"
			],
			"source_name": "Secureworks:GOLD CRYSTAL",
			"tools": [],
			"source_id": "Secureworks",
			"reports": null
		},
		{
			"id": "aa73cd6a-868c-4ae4-a5b2-7cb2c5ad1e9d",
			"created_at": "2022-10-25T16:07:24.139848Z",
			"updated_at": "2026-04-10T02:00:04.878798Z",
			"deleted_at": null,
			"main_name": "Safe",
			"aliases": [],
			"source_name": "ETDA:Safe",
			"tools": [
				"DebugView",
				"LZ77",
				"OpenDoc",
				"SafeDisk",
				"TypeConfig",
				"UPXShell",
				"UsbDoc",
				"UsbExe"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "d8dff631-87b0-4320-8352-becff28dbcf1",
			"created_at": "2022-10-25T16:07:24.565038Z",
			"updated_at": "2026-04-10T02:00:05.034516Z",
			"deleted_at": null,
			"main_name": "ShinyHunters",
			"aliases": [],
			"source_name": "ETDA:ShinyHunters",
			"tools": [],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775439133,
	"ts_updated_at": 1775792099,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/5f9c4e7ce8bec8ba44531f18b0160a4332e28d0f.pdf",
		"text": "https://archive.orkl.eu/5f9c4e7ce8bec8ba44531f18b0160a4332e28d0f.txt",
		"img": "https://archive.orkl.eu/5f9c4e7ce8bec8ba44531f18b0160a4332e28d0f.jpg"
	}
}