Badge
11,371 badges added since 01 January 2025
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions

For more than 150 years, men and women at Louis Vuitton have shared the same spirit of excellence and passion, reaffirming their expertise every day, the world over. With us, every career is a journey, filled with excitement and challenge, desire and daring. There is no better way to reveal your potential. Explore, develop, innovate, create... Every journey is unique. Today, Louis Vuitton invites you to discover your own.

Louis Vuitton A.I CyberSecurity Scoring

Louis Vuitton

Company Details

Linkedin ID:

louis-vuitton

Employees number:

26,974

Number of followers:

3,300,248

NAICS:

4483

Industry Type:

Retail Luxury Goods and Jewelry

Homepage:

louisvuitton.com

IP Addresses:

0

Company ID:

LOU_5764444

Scan Status:

In-progress

AI scoreLouis Vuitton Risk Score (AI oriented)

Between 550 and 599

https://images.rankiteo.com/companyimages/louis-vuitton.jpeg
Louis Vuitton Retail Luxury Goods and Jewelry
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
Get a Score Increase
globalscoreLouis Vuitton Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/louis-vuitton.jpeg
Louis Vuitton Retail Luxury Goods and Jewelry
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Louis Vuitton Company CyberSecurity News & History

Past Incidents
11
Attack Types
3
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
Christian Dior CoutureBreach8543/2026NA
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Christian Dior Data Breach Settlement Offers Compensation to Affected U.S. Consumers Christian Dior Inc. has reached a class action settlement following a January 2025 data breach that exposed sensitive customer information, including names, contact details, addresses, dates of birth, and in some cases, government IDs or Social Security numbers. The breach prompted a lawsuit alleging inadequate cybersecurity protections, though Dior denies any wrongdoing, opting to settle to avoid prolonged litigation. Who Is Eligible? The settlement covers U.S. individuals who received a breach notification from Christian Dior by mail or email. Two tiers of claimants exist: - Tier 1: Those whose Social Security numbers were compromised. - Tier 2: All other notified individuals whose SSNs were not exposed. Compensation Details Eligible class members may receive: - Cash payments: Up to $1,500 for documented out-of-pocket losses (e.g., fraud-related expenses, credit monitoring fees, ID replacement costs) incurred between July 18, 2025, and March 11, 2026. - Flat $100 payment: Tier 1 members can claim this without documentation. - Credit monitoring: Two years of CyEx Financial Shield Complete, including $1 million in fraud insurance and identity theft monitoring. Claim Process & Deadlines Claims must be submitted by May 25, 2026, via an online form (using a unique ID/PIN from the notice) or a mailed PDF. Documented losses require receipts or bank statements, while flat payments and credit monitoring do not. Payouts will be distributed after final court approval, expected post-June 22, 2026, via PayPal, Venmo, Zelle, virtual prepaid cards, or check. Settlement Fund Allocation The fund covers administrative costs, up to $400,000 in attorneys’ fees, $5,000 in service awards for class representatives, and credit monitoring expenses, with remaining funds allocated to eligible claimants.

Louis VuittonBreach8542/2026SalesforceSalesforce
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: South Korea Fines Luxury Brands $24.9M for Major Data Breaches South Korea’s Personal Information Protection Commission (PIPC) has imposed a combined 36 billion won ($24.9 million) in fines on the Korean subsidiaries of Louis Vuitton, Dior, and Tiffany for failing to protect customer data from cyberattacks. Louis Vuitton Korea received the largest penalty 21.4 billion won after hackers breached its systems on three occasions, exposing the personal data of 3.6 million customers, including names, phone numbers, and birth dates. The PIPC cited poor security practices for remote logins, which allowed an external actor to compromise an employee device. Christian Dior Couture Korea was fined 12.2 billion won following a breach affecting 1.95 million users, where employees were tricked into granting system access to malicious actors. The company remained unaware of the incident for three months. Meanwhile, Tiffany Korea faced a 2.4 billion won fine after a breach exposed the data of 4,600 customers, including names and email addresses. In a separate case, the PIPC penalized BKR (Burger King Korea) 924 million won for illegally collecting personal data from minors under 13 without guardian consent. MGC Global (Mega MGC Coffee) was fined 642 million won for sending unsolicited marketing messages to customers who had not opted in. Additionally, eight other food and beverage companies were fined for violating data protection laws. The penalties highlight growing regulatory scrutiny over corporate data security and compliance with South Korea’s privacy laws.

Louis VuittonBreach6029/2025NA
Rankiteo Explanation :
Attack limited on finance or reputation

Description: In September 2025, Dior (Shanghai) was publicly sanctioned in China for unlawfully transferring personal information (PI) of Chinese users to its headquarters in France without complying with regulatory requirements. The violations included: - Failing to complete a cross-border data transfer security assessment, enter a standard contract, or obtain PI protection certification. - Not informing users adequately about overseas processing methods or obtaining their ‘separate consent’ before sharing data. - Lacking technical safeguards (e.g., encryption, de-identification) for collected PI. The breach was exposed after users received warning messages, triggering an investigation by China’s public security authority. While the penalty details were undisclosed, the case marked China’s first administrative penalty for illegal cross-border PI transfers, signaling stricter enforcement of the Personal Information Protection Law (PIPL). The incident underscored systemic compliance gaps in Dior’s data localization and security practices, risking reputational damage, regulatory scrutiny, and potential civil claims.

Louis VuittonBreach8547/2025NA
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Louis Vuitton has suffered a data breach where an unauthorised third party accessed its UK operation's systems and obtained customer information such as names, contact details, and purchase history. Although no financial data was compromised, the company warned customers about potential phishing, fraud, or unauthorised use of their information. This is the third breach of LVMH’s systems in the past three months, with previous incidents affecting Louis Vuitton's Korean operation and Christian Dior Couture.

Louis VuittonBreach8547/2025NA
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: In July 2025, luxury fashion brand Louis Vuitton confirmed a data breach affecting thousands of its customers. The incident exposed highly sensitive personal information, including names, contact details, and purchase histories. While the exact scale of the breach remains undisclosed, the leaked data particularly transaction records and customer profiles poses severe risks. Criminals could exploit this information for targeted phishing attacks, identity theft, or financial fraud, especially given the brand’s high-net-worth clientele. The breach underscores vulnerabilities in third-party data-sharing practices, as retailers often store and share customer data with minimal oversight. Though no ransomware was involved, the exposure of personal and financial details linked to luxury purchases heightens the potential for reputation damage, fraudulent activity, and long-term trust erosion. The breach aligns with broader trends in 2025, where stolen account data including 6.8 million records earlier in the year fueled underground markets for identity exploitation.

Christian Dior CoutureRansomware10045/2025NA
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Dior Hit by Suspected Ransomware Attack, Customer Data Exposed French luxury fashion house Dior has fallen victim to a suspected ransomware attack, with hackers gaining unauthorized access to internal servers and compromising sensitive customer data. The breach, still under investigation, appears to involve file-encrypting malware, though Dior has not confirmed whether a ransom demand was made. The exposed data includes names, gender details, phone numbers, email and postal addresses, purchase history, and fashion preferences categorized by gender and age. While no financial information such as payment details or employee records was leaked, the stolen data poses risks for targeted phishing attacks, where cybercriminals could use personal details to craft convincing fraudulent messages. Dior has responded by implementing security measures to contain the breach and prevent further spread of the malware. The company’s IT teams are conducting a full investigation and have committed to providing updates as new details emerge. Customers have been advised to monitor their accounts for suspicious activity, as the stolen data may be exploited in phishing schemes over the next 6 to 12 months. The incident follows a recent wave of cyberattacks on major retail brands, including Marks & Spencer, Co-Op, and Harrods, linked to the "Scattered Spider" gang and the DragonForce ransomware group. While Dior has not attributed the attack to a specific threat actor, the breach underscores the growing focus of cybercriminals on retail data, which can be used for fraud, identity theft, or even targeted marketing by third parties. As the investigation continues, the full impact of the breach remains unclear, though the exposure of personal details particularly shopping preferences raises concerns about long-term privacy risks.

Louis VuittonCyber Attack8545/2025NA
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: French luxury fashion brand Dior suffered a cyberattack on May 7, resulting in the exposure of customer data from its Chinese and South Korean operations. While account passwords and payment card details remained unaffected, the breach compromised personal information of customers, including: - China: Full names, gender, phone numbers, email addresses, postal addresses, and purchase histories. - South Korea: Contact details, purchase information, and shared preferences (e.g., product interests). The incident has triggered phishing risks for affected individuals, with Korean legislators criticizing Dior for delayed reporting to authorities. The attack’s scope is still under investigation, but the leaked data though not financial poses reputational and privacy risks, particularly given the high-profile nature of the brand and its customer base. Authorities and impacted users have been alerted, though the long-term consequences (e.g., fraud, regulatory penalties) remain unclear.

Louis VuittonBreach8541/2025NA
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Christian Dior Couture, a luxury fashion house owned by Louis Vuitton, experienced a significant cybersecurity incident that exposed sensitive personal information of its customers. The breach, discovered in May 2025, involved unauthorized access to customer databases containing personal data including names, addresses, dates of birth, and in some cases, Social Security numbers. The incident occurred on January 26, 2025, but was not detected until May 7, 2025. The affected database contained extensive personally identifiable information (PII) such as passport numbers, government-issued ID numbers, and Social Security numbers. No financial data was compromised, but the breach raised concerns about identity theft risks. Dior has implemented several remediation measures, including enhanced network security and complimentary credit monitoring services for affected customers.

Louis VuittonBreach8541/2025SalesforceSalesforce
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: South Korea Fines Luxury Brands $24.9 Million Over Data Breaches South Korea’s privacy regulator has levied fines totaling 36 billion won ($24.9 million) against the Korean subsidiaries of Louis Vuitton, Dior, and Tiffany following separate data breaches that exposed millions of customers’ personal information. The penalties stem from investigations confirming unauthorized access to sensitive customer data, though specific details on the breaches’ scope and timing remain undisclosed. The fines highlight growing regulatory scrutiny over data protection in South Korea, where authorities are enforcing stricter compliance with privacy laws. The incident underscores the financial and reputational risks for global brands handling large-scale consumer data. In related cybersecurity developments, Japan Airlines reported that up to 28,000 customers were affected by unauthorized access to its baggage service system, while Volvo Group disclosed that 16,991 employees were impacted as part of a broader Conduent data breach, which has now exposed 25 million individuals. These incidents reflect the escalating threat landscape for both corporate and personal data security.

Louis VuittonBreach100611/2024NA
Rankiteo Explanation :
Attack threatening the economy of geographical region

Description: Dior’s Shanghai branch was penalized for violating China’s cybersecurity and data protection laws by transferring customer data to its French headquarters without complying with mandatory legal requirements. The breach involved the unauthorized cross-border transfer of personal information, lacking the necessary security screening, customer disclosure, and encryption as mandated by Chinese regulations. The incident highlights systemic failures in data governance, exposing customers to potential privacy risks while undermining compliance with China’s strict data localization and protection frameworks. The case underscores the heightened scrutiny under China’s evolving cybersecurity policies, particularly ahead of the enforcement of the National Cybersecurity Incident Reporting Management Measures (effective November 1, 2024). While the article does not specify the volume of data or direct harm (e.g., financial fraud or identity theft), the unauthorized transfer alone constitutes a serious regulatory violation, aligning with China’s classification of incidents threatening social stability or national data security interests. The fine serves as a warning to multinational corporations operating in China, emphasizing the legal and reputational consequences of non-compliance with data sovereignty laws.

Louis VuittonBreach85407/2019NA
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: International beauty retailer Sephora has admitted to a breach of its online users' data, affecting customers in Singapore as well as in other countries including Malaysia, Indonesia, Thailand, Philippines. Some personal information has been exposed to unauthorized third parties, including first and last name, date of birth, gender, e-mail address, and encrypted password. Determining that no credit card information was accessed and that the company had no reason to believe that any personal data has been misused. The security incident was limited to a database serving our Southeast Asia, Hong Kong SAR, and Australia/New Zealand customers who used their online services.

Christian Dior Inc.: Christian Dior Data Breach Class Action Settlement
Breach
Severity: 85
Impact: 4
Seen: 3/2026
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Christian Dior Data Breach Settlement Offers Compensation to Affected U.S. Consumers Christian Dior Inc. has reached a class action settlement following a January 2025 data breach that exposed sensitive customer information, including names, contact details, addresses, dates of birth, and in some cases, government IDs or Social Security numbers. The breach prompted a lawsuit alleging inadequate cybersecurity protections, though Dior denies any wrongdoing, opting to settle to avoid prolonged litigation. Who Is Eligible? The settlement covers U.S. individuals who received a breach notification from Christian Dior by mail or email. Two tiers of claimants exist: - Tier 1: Those whose Social Security numbers were compromised. - Tier 2: All other notified individuals whose SSNs were not exposed. Compensation Details Eligible class members may receive: - Cash payments: Up to $1,500 for documented out-of-pocket losses (e.g., fraud-related expenses, credit monitoring fees, ID replacement costs) incurred between July 18, 2025, and March 11, 2026. - Flat $100 payment: Tier 1 members can claim this without documentation. - Credit monitoring: Two years of CyEx Financial Shield Complete, including $1 million in fraud insurance and identity theft monitoring. Claim Process & Deadlines Claims must be submitted by May 25, 2026, via an online form (using a unique ID/PIN from the notice) or a mailed PDF. Documented losses require receipts or bank statements, while flat payments and credit monitoring do not. Payouts will be distributed after final court approval, expected post-June 22, 2026, via PayPal, Venmo, Zelle, virtual prepaid cards, or check. Settlement Fund Allocation The fund covers administrative costs, up to $400,000 in attorneys’ fees, $5,000 in service awards for class representatives, and credit monitoring expenses, with remaining funds allocated to eligible claimants.

Tiffany Korea, Louis Vuitton Korea and Christian Dior Couture Korea: Korean units of Louis Vuitton, Dior, Tiffany fined $24.9 mil. over customer data leaks
Breach
Severity: 85
Impact: 4
Seen: 2/2026
Blog:
Supply Chain Source: SalesforceSalesforce
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: South Korea Fines Luxury Brands $24.9M for Major Data Breaches South Korea’s Personal Information Protection Commission (PIPC) has imposed a combined 36 billion won ($24.9 million) in fines on the Korean subsidiaries of Louis Vuitton, Dior, and Tiffany for failing to protect customer data from cyberattacks. Louis Vuitton Korea received the largest penalty 21.4 billion won after hackers breached its systems on three occasions, exposing the personal data of 3.6 million customers, including names, phone numbers, and birth dates. The PIPC cited poor security practices for remote logins, which allowed an external actor to compromise an employee device. Christian Dior Couture Korea was fined 12.2 billion won following a breach affecting 1.95 million users, where employees were tricked into granting system access to malicious actors. The company remained unaware of the incident for three months. Meanwhile, Tiffany Korea faced a 2.4 billion won fine after a breach exposed the data of 4,600 customers, including names and email addresses. In a separate case, the PIPC penalized BKR (Burger King Korea) 924 million won for illegally collecting personal data from minors under 13 without guardian consent. MGC Global (Mega MGC Coffee) was fined 642 million won for sending unsolicited marketing messages to customers who had not opted in. Additionally, eight other food and beverage companies were fined for violating data protection laws. The penalties highlight growing regulatory scrutiny over corporate data security and compliance with South Korea’s privacy laws.

Dior (Shanghai) Co., Ltd.
Breach
Severity: 60
Impact: 2
Seen: 9/2025
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack limited on finance or reputation

Description: In September 2025, Dior (Shanghai) was publicly sanctioned in China for unlawfully transferring personal information (PI) of Chinese users to its headquarters in France without complying with regulatory requirements. The violations included: - Failing to complete a cross-border data transfer security assessment, enter a standard contract, or obtain PI protection certification. - Not informing users adequately about overseas processing methods or obtaining their ‘separate consent’ before sharing data. - Lacking technical safeguards (e.g., encryption, de-identification) for collected PI. The breach was exposed after users received warning messages, triggering an investigation by China’s public security authority. While the penalty details were undisclosed, the case marked China’s first administrative penalty for illegal cross-border PI transfers, signaling stricter enforcement of the Personal Information Protection Law (PIPL). The incident underscored systemic compliance gaps in Dior’s data localization and security practices, risking reputational damage, regulatory scrutiny, and potential civil claims.

Louis Vuitton
Breach
Severity: 85
Impact: 4
Seen: 7/2025
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Louis Vuitton has suffered a data breach where an unauthorised third party accessed its UK operation's systems and obtained customer information such as names, contact details, and purchase history. Although no financial data was compromised, the company warned customers about potential phishing, fraud, or unauthorised use of their information. This is the third breach of LVMH’s systems in the past three months, with previous incidents affecting Louis Vuitton's Korean operation and Christian Dior Couture.

Louis Vuitton
Breach
Severity: 85
Impact: 4
Seen: 7/2025
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: In July 2025, luxury fashion brand Louis Vuitton confirmed a data breach affecting thousands of its customers. The incident exposed highly sensitive personal information, including names, contact details, and purchase histories. While the exact scale of the breach remains undisclosed, the leaked data particularly transaction records and customer profiles poses severe risks. Criminals could exploit this information for targeted phishing attacks, identity theft, or financial fraud, especially given the brand’s high-net-worth clientele. The breach underscores vulnerabilities in third-party data-sharing practices, as retailers often store and share customer data with minimal oversight. Though no ransomware was involved, the exposure of personal and financial details linked to luxury purchases heightens the potential for reputation damage, fraudulent activity, and long-term trust erosion. The breach aligns with broader trends in 2025, where stolen account data including 6.8 million records earlier in the year fueled underground markets for identity exploitation.

Dior and Marks & Spencer: Dior likely hit by ransomware attack
Ransomware
Severity: 100
Impact: 4
Seen: 5/2025
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Dior Hit by Suspected Ransomware Attack, Customer Data Exposed French luxury fashion house Dior has fallen victim to a suspected ransomware attack, with hackers gaining unauthorized access to internal servers and compromising sensitive customer data. The breach, still under investigation, appears to involve file-encrypting malware, though Dior has not confirmed whether a ransom demand was made. The exposed data includes names, gender details, phone numbers, email and postal addresses, purchase history, and fashion preferences categorized by gender and age. While no financial information such as payment details or employee records was leaked, the stolen data poses risks for targeted phishing attacks, where cybercriminals could use personal details to craft convincing fraudulent messages. Dior has responded by implementing security measures to contain the breach and prevent further spread of the malware. The company’s IT teams are conducting a full investigation and have committed to providing updates as new details emerge. Customers have been advised to monitor their accounts for suspicious activity, as the stolen data may be exploited in phishing schemes over the next 6 to 12 months. The incident follows a recent wave of cyberattacks on major retail brands, including Marks & Spencer, Co-Op, and Harrods, linked to the "Scattered Spider" gang and the DragonForce ransomware group. While Dior has not attributed the attack to a specific threat actor, the breach underscores the growing focus of cybercriminals on retail data, which can be used for fraud, identity theft, or even targeted marketing by third parties. As the investigation continues, the full impact of the breach remains unclear, though the exposure of personal details particularly shopping preferences raises concerns about long-term privacy risks.

Dior
Cyber Attack
Severity: 85
Impact: 4
Seen: 5/2025
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: French luxury fashion brand Dior suffered a cyberattack on May 7, resulting in the exposure of customer data from its Chinese and South Korean operations. While account passwords and payment card details remained unaffected, the breach compromised personal information of customers, including: - China: Full names, gender, phone numbers, email addresses, postal addresses, and purchase histories. - South Korea: Contact details, purchase information, and shared preferences (e.g., product interests). The incident has triggered phishing risks for affected individuals, with Korean legislators criticizing Dior for delayed reporting to authorities. The attack’s scope is still under investigation, but the leaked data though not financial poses reputational and privacy risks, particularly given the high-profile nature of the brand and its customer base. Authorities and impacted users have been alerted, though the long-term consequences (e.g., fraud, regulatory penalties) remain unclear.

Christian Dior Couture
Breach
Severity: 85
Impact: 4
Seen: 1/2025
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Christian Dior Couture, a luxury fashion house owned by Louis Vuitton, experienced a significant cybersecurity incident that exposed sensitive personal information of its customers. The breach, discovered in May 2025, involved unauthorized access to customer databases containing personal data including names, addresses, dates of birth, and in some cases, Social Security numbers. The incident occurred on January 26, 2025, but was not detected until May 7, 2025. The affected database contained extensive personally identifiable information (PII) such as passport numbers, government-issued ID numbers, and Social Security numbers. No financial data was compromised, but the breach raised concerns about identity theft risks. Dior has implemented several remediation measures, including enhanced network security and complimentary credit monitoring services for affected customers.

Japan Airlines, Tiffany, Dior, Volvo Group and Louis Vuitton: South Korea fines Louis Vuitton, Dior and Tiffany $24.9 million over customer data breaches
Breach
Severity: 85
Impact: 4
Seen: 1/2025
Blog:
Supply Chain Source: SalesforceSalesforce
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: South Korea Fines Luxury Brands $24.9 Million Over Data Breaches South Korea’s privacy regulator has levied fines totaling 36 billion won ($24.9 million) against the Korean subsidiaries of Louis Vuitton, Dior, and Tiffany following separate data breaches that exposed millions of customers’ personal information. The penalties stem from investigations confirming unauthorized access to sensitive customer data, though specific details on the breaches’ scope and timing remain undisclosed. The fines highlight growing regulatory scrutiny over data protection in South Korea, where authorities are enforcing stricter compliance with privacy laws. The incident underscores the financial and reputational risks for global brands handling large-scale consumer data. In related cybersecurity developments, Japan Airlines reported that up to 28,000 customers were affected by unauthorized access to its baggage service system, while Volvo Group disclosed that 16,991 employees were impacted as part of a broader Conduent data breach, which has now exposed 25 million individuals. These incidents reflect the escalating threat landscape for both corporate and personal data security.

Dior (Shanghai)
Breach
Severity: 100
Impact: 6
Seen: 11/2024
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack threatening the economy of geographical region

Description: Dior’s Shanghai branch was penalized for violating China’s cybersecurity and data protection laws by transferring customer data to its French headquarters without complying with mandatory legal requirements. The breach involved the unauthorized cross-border transfer of personal information, lacking the necessary security screening, customer disclosure, and encryption as mandated by Chinese regulations. The incident highlights systemic failures in data governance, exposing customers to potential privacy risks while undermining compliance with China’s strict data localization and protection frameworks. The case underscores the heightened scrutiny under China’s evolving cybersecurity policies, particularly ahead of the enforcement of the National Cybersecurity Incident Reporting Management Measures (effective November 1, 2024). While the article does not specify the volume of data or direct harm (e.g., financial fraud or identity theft), the unauthorized transfer alone constitutes a serious regulatory violation, aligning with China’s classification of incidents threatening social stability or national data security interests. The fine serves as a warning to multinational corporations operating in China, emphasizing the legal and reputational consequences of non-compliance with data sovereignty laws.

SEPHORA
Breach
Severity: 85
Impact: 4
Seen: 07/2019
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: International beauty retailer Sephora has admitted to a breach of its online users' data, affecting customers in Singapore as well as in other countries including Malaysia, Indonesia, Thailand, Philippines. Some personal information has been exposed to unauthorized third parties, including first and last name, date of birth, gender, e-mail address, and encrypted password. Determining that no credit card information was accessed and that the company had no reason to believe that any personal data has been misused. The security incident was limited to a database serving our Southeast Asia, Hong Kong SAR, and Australia/New Zealand customers who used their online services.

Ailogo

Louis Vuitton Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Louis Vuitton

Incidents vs Retail Luxury Goods and Jewelry Industry Average (This Year)

Louis Vuitton has 60.0% fewer incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

Louis Vuitton has 13.79% fewer incidents than the average of all companies with at least one recorded incident.

Incident Types Louis Vuitton vs Retail Luxury Goods and Jewelry Industry Avg (This Year)

Louis Vuitton reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.

Incident History — Louis Vuitton (X = Date, Y = Severity)

Louis Vuitton cyber incidents detection timeline including parent company and subsidiaries

Louis Vuitton Company Subsidiaries

SubsidiaryImage

For more than 150 years, men and women at Louis Vuitton have shared the same spirit of excellence and passion, reaffirming their expertise every day, the world over. With us, every career is a journey, filled with excitement and challenge, desire and daring. There is no better way to reveal your potential. Explore, develop, innovate, create... Every journey is unique. Today, Louis Vuitton invites you to discover your own.

Loading...
similarCompanies

Louis Vuitton Similar Companies

Gucci

Founded in Florence, Italy in 1921, Gucci is one of the world’s leading luxury brands. Following the House’s centenary, Gucci forges ahead continuing to redefine fashion and luxury while celebrating creativity, Italian craftsmanship, and innovation. Gucci is part of the global luxury group Kering,

Kering

Kering is a global, family-led luxury group, home to people whose passion and expertise nurture creative Houses across ready-to-wear and couture, leather goods, jewelry, eyewear and beauty: Gucci, Saint Laurent, Bottega Veneta, Balenciaga, McQueen, Brioni, Boucheron, Pomellato, Dodo, Qeelin, Ginori

Tiffany & Co.

In 1837 Charles Lewis Tiffany founded his company in New York City where his store was soon acclaimed as the palace of jewels for its exceptional gemstones. Since then TIFFANY & CO. has become synonymous with elegance, innovative design, fine craftsmanship and creative excellence. During the 20th ce

LVMH is the world leader in luxury. A family group founded in 1987 and headed by Chairman and CEO Bernard Arnault, LVMH is now home to 75 iconic Maisons, which embody a distinctive art de vivre blending heritage and modernity. With reported sales of 86.2 billion euros in 2023 and 6000 stores around

Swatch Group

Swatch Group is the world's number one manufacturer of finished watches. With its 16 watch brands, the Group is present in all price segments, and is also active in the manufacture and sale of jewelry, watch movements and components. Swatch Group unites, among other companies, the following watch b

CHANEL

Chanel is a private company and world leader in creating, manufacturing and distributing luxury products, including Ready-to-Wear, Accessories, Fragrances, Makeup, Skincare, Jewellery and Watches. Founded by Gabrielle Chanel in 1910, the House remains dedicated to exceptional craftsmanship and offer

Christian Dior Couture

Welcome to Christian Dior Couture, House of Dreams, House of Talents. Christian Dior was the designer of dreams. In founding his House in 1947, marked by the revolution of the New Look, he metamorphosed his reveries into wonderful creations. His visionary spirit never ceased to make Clients all ove

Prada Group

Pioneer of a dialogue with contemporary society across diverse cultural spheres and an influential leader in luxury fashion, Prada Group founds its identity on essential values such as creative independence, transformation, and sustainable development, offering its brands a shared vision to interpre

Cartier

A reference in the world of luxury, Cartier, whose name is synonymous with open-mindedness and curiosity, stands out with its creations and finds beauty wherever it may lie. The Maison has several areas of expression. From jewelry to high jewelry, from watchmaking to fragrances and leather goods an

newsone

Louis Vuitton CyberSecurity News

March 13, 2026 02:29 PM
Dior Fined By China's Cybersecurity Authority For Sending Consumer Data Overseas

An investigation following a May data breach found that the luxury house violated consumer rights protected by China's Personal Information Protection Law.

February 20, 2026 08:00 AM
Dior, Louis Vuitton and Tiffany hit with massive fines over data breaches in South Korea

The country's data protection authority says the luxury brands failed to implement basic security measures, issuing penalties totaling $25...

February 16, 2026 08:00 AM
Dior, Louis Vuitton, Tiffany Fined $25 Million in South Korea After Data Breaches

South Korea issued significant fines to several major luxury brands over a recent hacker attack that resulted in massive data breaches.

December 16, 2025 08:00 AM
Top 10 Cyber-Attacks of 2025

The past year has seen an unprecedented number of cyber-attacks targeting large enterprises and globally recognized brands.

December 11, 2025 08:00 AM
2025 in cybersecurity: Major incidents of the year

SiliconRepublic.com has kept an ear to the ground, covering cybersecurity stories as they evolve. Here are some of the biggest incidents.

November 14, 2025 08:00 AM
The retail sector needs a cybersecurity talent incubator

Retailers are facing an unprecedented cybersecurity crisis, with giants like Louis Vuitton and Dior losing millions to data breaches.

October 24, 2025 07:00 AM
Cyber breaches in retail: The 2025 breakdown

Ross Brewer at Graylog discusses how the retail cyberattacks of 2025 prove that without visibility even the strongest brands remain...

September 25, 2025 07:00 AM
What the Latest Cyber Attacks Mean for Luxury Supply Chains

A ransomware attack on Gucci, Balenciaga and McQueen exposes customer data and highlights growing cybersecurity gaps in luxury retail supply...

September 19, 2025 07:00 AM
Louis Vuitton data breach could lead to potential class action lawsuits

Who: Louis Vuitton is addressing a cybersecurity incident affecting over 419,000 customers. Why: An unauthorized party accessed a database...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Louis Vuitton CyberSecurity History Information

Official Website of Louis Vuitton

The official website of Louis Vuitton is http://www.louisvuitton.com.

Louis Vuitton’s AI-Generated Cybersecurity Score

According to Rankiteo, Louis Vuitton’s AI-generated cybersecurity score is 585, reflecting their Very Poor security posture.

How many security badges does Louis Vuitton’ have ?

According to Rankiteo, Louis Vuitton currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has Louis Vuitton been affected by any supply chain cyber incidents ?

According to Rankiteo, Louis Vuitton has been affected by multiple supply chain cyber incidents. The affected supply chain sources and their corresponding incident IDs are:

  • Salesforce (Incident ID: TIFLVMCHR1770865579)
  • Salesforce (Incident ID: LOUPARVOLTIFJAP1770908674)
Does Louis Vuitton have SOC 2 Type 1 certification ?

According to Rankiteo, Louis Vuitton is not certified under SOC 2 Type 1.

Does Louis Vuitton have SOC 2 Type 2 certification ?

According to Rankiteo, Louis Vuitton does not hold a SOC 2 Type 2 certification.

Does Louis Vuitton comply with GDPR ?

According to Rankiteo, Louis Vuitton is not listed as GDPR compliant.

Does Louis Vuitton have PCI DSS certification ?

According to Rankiteo, Louis Vuitton does not currently maintain PCI DSS compliance.

Does Louis Vuitton comply with HIPAA ?

According to Rankiteo, Louis Vuitton is not compliant with HIPAA regulations.

Does Louis Vuitton have ISO 27001 certification ?

According to Rankiteo,Louis Vuitton is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Louis Vuitton

Louis Vuitton operates primarily in the Retail Luxury Goods and Jewelry industry.

Number of Employees at Louis Vuitton

Louis Vuitton employs approximately 26,974 people worldwide.

Subsidiaries Owned by Louis Vuitton

Louis Vuitton presently has no subsidiaries across any sectors.

Louis Vuitton’s LinkedIn Followers

Louis Vuitton’s official LinkedIn profile has approximately 3,300,248 followers.

NAICS Classification of Louis Vuitton

Louis Vuitton is classified under the NAICS code 4483, which corresponds to Jewelry, Luggage, and Leather Goods Stores.

Louis Vuitton’s Presence on Crunchbase

No, Louis Vuitton does not have a profile on Crunchbase.

Louis Vuitton’s Presence on LinkedIn

Yes, Louis Vuitton maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/louis-vuitton.

Cybersecurity Incidents Involving Louis Vuitton

As of April 03, 2026, Rankiteo reports that Louis Vuitton has experienced 11 cybersecurity incidents.

Number of Peer and Competitor Companies

Louis Vuitton has an estimated 1,423 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Louis Vuitton ?

Incident Types: The types of cybersecurity incidents that have occurred include Ransomware, Cyber Attack and Breach.

What was the total financial impact of these incidents on Louis Vuitton ?

Total Financial Loss: The total financial loss from these incidents is estimated to be $72 billion.

How does Louis Vuitton detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with comprehensive investigation and containment measures, and remediation measures with enhanced network security measures, and communication strategy with customer notifications and dedicated breach response line, and communication strategy with public disclosure (july 2025), and incident response plan activated with mandatory under new rules (initial report within 30–60 minutes, postmortem within 30 days)., and law enforcement notified with required for 'major' or 'particularly major' incidents (reported to **national cyber info department** and **public security department**)., and communication strategy with multi-channel reporting (hotline **12387**, website, wechat, email)., and enhanced monitoring with expected to be adopted by organizations to meet real-time reporting requirements., and and communication strategy with official warning messages to users, and incident response plan activated with yes (ongoing investigation), and communication strategy with customers urged to be mindful of phishing attacks, and incident response plan activated with yes, and containment measures with security measures implemented to contain the breach and prevent further spread of the malware, and communication strategy with customers advised to monitor their accounts for suspicious activity; updates to be provided as new details emerge, and communication strategy with breach notifications sent via mail or email..

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: Sephora Data Breach

Description: International beauty retailer Sephora has admitted to a breach of its online users' data, affecting customers in Singapore as well as in other countries including Malaysia, Indonesia, Thailand, Philippines.

Type: Data Breach

Incident : Data Breach

Title: Louis Vuitton UK Customer Data Breach

Description: Louis Vuitton, a leading brand of the French luxury group LVMH, suffered a data breach where an unauthorized third party accessed its UK operation’s systems and obtained customer information such as names, contact details, and purchase history.

Date Detected: 2023-07-02

Type: Data Breach

Attack Vector: Unauthorized Access

Incident : Data Breach

Title: Dior Customer Database Breach

Description: Christian Dior Couture, the luxury fashion house owned by Louis Vuitton, has begun notifying customers of a major cybersecurity incident that exposed sensitive personal information of clients.

Date Detected: 2025-05-07

Type: Data Breach

Attack Vector: Unauthorized Access

Threat Actor: Unspecified third party

Incident : Data Breach

Title: Louis Vuitton Data Breach (July 2025)

Description: Luxury fashion brand Louis Vuitton confirmed a data breach in July 2025 that exposed personal information of thousands of customers, including names, contact details, and purchase histories. The breach highlights risks associated with long-term data retention, third-party data-sharing vulnerabilities, and the criminal marketplace for stolen data. Attackers may combine exposed purchase histories and addresses with phishing tactics (enhanced by AI) to build detailed identity profiles for fraud, identity theft, or targeted attacks. The incident underscores broader concerns about data broker practices, regulatory compliance (e.g., GDPR, CCPA), and consumer rights to data deletion.

Date Publicly Disclosed: 2025-07

Type: Data Breach

Vulnerability Exploited: Inadequate Third-Party VettingLong-Term Data RetentionLack of Data Minimization

Motivation: Financial GainFraud EnablementIdentity TheftData Monetization (Dark Web Sales)

Incident : Regulatory Policy Change

Title: China Enforces New Cybersecurity Incident Reporting Rules with Strict Deadlines

Description: From November 1, 2024, the Cyberspace Administration of China (CAC) will enforce its **National Cybersecurity Incident Reporting Management Measures**, requiring Chinese network operators to report serious cyber incidents within **60 minutes** (or **30 minutes** for 'particularly major' events). The rules apply broadly to 'network operators'—any entity owning, managing, or providing network services—and mandate rapid disclosure of incidents threatening national security, social stability, or involving large-scale data breaches (e.g., >100 million personal records) or prolonged outages (e.g., government/news websites offline for >24 hours). Operators must submit initial reports with detailed incident specifics (systems affected, attack timeline, vulnerabilities, ransom demands, etc.) and a **30-day postmortem** analyzing root causes and lessons learned. Non-compliance risks severe penalties, including fines for late, false, or concealed reporting. The CAC has established multiple reporting channels (hotline, website, WeChat, email) to ensure compliance. This follows a recent fine against **Dior Shanghai** for unlawful cross-border data transfers without encryption or proper disclosure.

Date Publicly Disclosed: 2024-10-01

Type: Regulatory Policy Change

Motivation: Regulatory ComplianceNational SecurityData Protection

Incident : Data Breach

Title: Dior Shanghai Administrative Penalty for Unlawful Cross-Border Transfer of Personal Information

Description: On September 9, 2025, Dior (Shanghai) Co., Ltd. was publicly sanctioned in China for unlawfully transferring personal information (PI) overseas without completing required security assessments, obtaining separate user consent, or implementing necessary technical safeguards like encryption. This marks the first administrative penalty in China for unlawful cross-border PI transfers, signaling a shift from rulemaking to active enforcement under the Personal Information Protection Law (PIPL). The case underscores the need for multinational companies (MNCs) to reassess and localize their data compliance frameworks in China to meet increasingly stringent regulatory requirements. The investigation was triggered by a data breach reported in May 2025, where users in China received official warning messages from Dior. The penalty details were not disclosed, but the case highlights critical compliance gaps in cross-border data transfer mechanisms, user consent practices, and technical safeguards.

Date Detected: 2025-05

Date Publicly Disclosed: 2025-09-09

Type: Data Breach

Vulnerability Exploited: Lack of Cross-Border Data Transfer ComplianceInadequate User Consent MechanismsAbsence of Technical Safeguards (Encryption/De-identification)

Incident : Data Breach

Title: Dior Cyberattack Exposes Customer Data in China and South Korea

Description: French multinational luxury fashion brand Dior was impacted by a cyberattack on May 7, resulting in the exposure of customer data from its Chinese and South Korean operations. The compromised data includes full names, gender, phone numbers, email addresses, postal addresses, purchase histories, contact details, and shared preferences. Dior has warned affected customers about potential phishing attacks. Korean legislators have criticized Dior for failing to promptly inform authorities.

Date Detected: 2024-05-07

Type: Data Breach

Incident : Ransomware

Title: Dior Hit by Suspected Ransomware Attack, Customer Data Exposed

Description: French luxury fashion house Dior has fallen victim to a suspected ransomware attack, with hackers gaining unauthorized access to internal servers and compromising sensitive customer data. The breach, still under investigation, appears to involve file-encrypting malware, though Dior has not confirmed whether a ransom demand was made.

Type: Ransomware

Incident : Data Breach

Title: South Korea Fines Luxury Brands for Major Data Breaches

Description: South Korea’s Personal Information Protection Commission (PIPC) imposed fines totaling 36 billion won ($24.9 million) on the Korean subsidiaries of Louis Vuitton, Dior, and Tiffany for failing to protect customer data from cyberattacks. Louis Vuitton Korea was fined 21.4 billion won after hackers breached its systems three times, exposing 3.6 million customers' data. Dior Korea was fined 12.2 billion won for a breach affecting 1.95 million users, and Tiffany Korea was fined 2.4 billion won for exposing 4,600 customers' data.

Type: Data Breach

Attack Vector: PhishingCompromised Employee Device

Vulnerability Exploited: Poor security practices for remote logins

Threat Actor: External Actor

Incident : Data Breach

Title: South Korea Fines Luxury Brands Over Data Breaches

Description: South Korea’s privacy regulator has levied fines totaling 36 billion won ($24.9 million) against the Korean subsidiaries of Louis Vuitton, Dior, and Tiffany following separate data breaches that exposed millions of customers’ personal information.

Type: Data Breach

Incident : Data Breach

Title: Christian Dior Data Breach Settlement

Description: Christian Dior Inc. has reached a class action settlement following a January 2025 data breach that exposed sensitive customer information, including names, contact details, addresses, dates of birth, and in some cases, government IDs or Social Security numbers. The breach prompted a lawsuit alleging inadequate cybersecurity protections, though Dior denies any wrongdoing, opting to settle to avoid prolonged litigation.

Date Detected: 2025-01

Type: Data Breach

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

How does the company identify the attack vectors used in incidents ?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Customer database systems.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach SEP2372423

Data Compromised: First name, Last name, Date of birth, Gender, E-mail address, Encrypted password

Systems Affected: database serving Southeast Asia, Hong Kong SAR, and Australia/New Zealand customers

Incident : Data Breach LVM852071225

Data Compromised: Names, Contact details, Purchase history

Incident : Data Breach CHR706072225

Data Compromised: Names, Addresses, Dates of birth, Passport numbers, Government-issued id numbers, Social security numbers

Systems Affected: Customer database systems

Identity Theft Risk: High

Payment Information Risk: None

Incident : Data Breach LOU0265102090625

Data Compromised: Names, Contact details, Purchase histories, Potential addresses

Brand Reputation Impact: High (Luxury brand trust erosion, privacy concerns)

Legal Liabilities: Potential GDPR/CCPA ViolationsRegulatory Scrutiny

Identity Theft Risk: High (Exposed data enables profiling for phishing/AI-driven scams)

Incident : Regulatory Policy Change CHR2433224091625

Operational Impact: Organizations must invest in **real-time monitoring** and **compliance teams** to meet strict reporting deadlines (30–60 minutes vs. EU's 72-hour rule).

Brand Reputation Impact: Potential reputational damage for non-compliant entities (e.g., Dior Shanghai fined for data transfer violations).

Legal Liabilities: Severe penalties for late, false, or concealed reporting, including fines and legal action against responsible personnel.

Incident : Data Breach CHR1592715093025

Data Compromised: Personal information (pi) of users in china

Operational Impact: Regulatory InvestigationAdministrative Penalty Under PIPLReputation Damage

Customer Complaints: ['Users Received Official Warning Messages']

Brand Reputation Impact: Widespread International AttentionErosion of Consumer TrustPotential Customer Attrition

Legal Liabilities: Administrative Penalty Under PIPL (Details Undisclosed)Potential Civil Claims

Identity Theft Risk: ['Exposure to Harassment Calls', 'Spam Emails', 'Fraud']

Incident : Data Breach CHR3163431111725

Data Compromised: Full names, Gender, Phone numbers, Email addresses, Postal addresses, Purchase histories, Contact details, Shared preferences

Customer Complaints: Criticism from Korean legislators for delayed notification

Brand Reputation Impact: Potential damage due to data exposure and delayed notification

Identity Theft Risk: High (due to exposed PII)

Payment Information Risk: None (payment card information confirmed not affected)

Incident : Ransomware CHRMAR1769504421

Data Compromised: Names, gender details, phone numbers, email and postal addresses, purchase history, fashion preferences categorized by gender and age

Systems Affected: Internal servers

Brand Reputation Impact: Raises concerns about long-term privacy risks

Identity Theft Risk: Poses risks for targeted phishing attacks and identity theft

Payment Information Risk: No financial information such as payment details was leaked

Incident : Data Breach TIFLVMCHR1770865579

Financial Loss: 36 billion won ($24.9 million) in fines

Identity Theft Risk: True

Incident : Data Breach LOUPARVOLTIFJAP1770908674

Financial Loss: 36 billion won ($24.9 million) in fines

Data Compromised: Personal information of millions of customers

Brand Reputation Impact: Reputational risks for global brands

Incident : Data Breach CHR1773773151

Data Compromised: Sensitive customer information, including names, contact details, addresses, dates of birth, government IDs, and Social Security numbers

Legal Liabilities: Class action lawsuit settlement

Identity Theft Risk: High (Social Security numbers and government IDs exposed)

What is the average financial loss per incident ?

Average Financial Loss: The average financial loss per incident is $6.55 billion.

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information, , Names, Contact Details, Purchase History, , Pii, Passport Numbers, Government-Issued Id Numbers, Social Security Numbers, , Personal Identifiable Information (Pii), Transaction Histories, , Personal Information (Pi), , Personally Identifiable Information (Pii), Purchase Histories, Contact Details, Shared Preferences, , Customer data, Names, Phone Numbers, Birth Dates, Email Addresses, , Personal information, Names, Contact Details, Addresses, Dates Of Birth, Government Ids, Social Security Numbers and .

Which entities were affected by each incident ?

Incident : Data Breach SEP2372423

Entity Name: Sephora

Entity Type: Retailer

Industry: Beauty

Location: SingaporeMalaysiaIndonesiaThailandPhilippinesHong Kong SARAustraliaNew Zealand

Incident : Data Breach LVM852071225

Entity Name: Louis Vuitton

Entity Type: Retailer

Industry: Fashion and Luxury Goods

Location: UK

Incident : Data Breach CHR706072225

Entity Name: Christian Dior Couture

Entity Type: Company

Industry: Fashion

Incident : Data Breach LOU0265102090625

Entity Name: Louis Vuitton

Entity Type: Luxury Retailer

Industry: Fashion & Apparel

Location: Global (HQ: Paris, France)

Customers Affected: Thousands

Incident : Regulatory Policy Change CHR2433224091625

Entity Name: Cyberspace Administration of China (CAC)

Entity Type: Government Regulatory Body

Industry: Cybersecurity Governance

Location: China

Incident : Regulatory Policy Change CHR2433224091625

Entity Name: Dior Shanghai

Entity Type: Subsidiary (Luxury Retail)

Industry: Fashion/Retail

Location: Shanghai, China

Incident : Regulatory Policy Change CHR2433224091625

Entity Name: Chinese Network Operators (Broad Category)

Entity Type: ISPs, Cloud Providers, Government Agencies, Private Enterprises

Industry: Multiple (IT, Telecom, Government, etc.)

Location: China

Incident : Data Breach CHR1592715093025

Entity Name: Dior (Shanghai) Co., Ltd.

Entity Type: Subsidiary

Industry: Luxury Retail

Location: Shanghai, China

Customers Affected: Users in China (Exact Number Undisclosed)

Incident : Data Breach CHR3163431111725

Entity Name: Dior (Chinese operations)

Entity Type: Subsidiary/Regional Office

Industry: Luxury Fashion

Location: China

Incident : Data Breach CHR3163431111725

Entity Name: Dior (South Korean operations)

Entity Type: Subsidiary/Regional Office

Industry: Luxury Fashion

Location: South Korea

Incident : Ransomware CHRMAR1769504421

Entity Name: Dior

Entity Type: Company

Industry: Luxury Fashion

Location: France

Incident : Data Breach TIFLVMCHR1770865579

Entity Name: Louis Vuitton Korea

Entity Type: Subsidiary

Industry: Luxury Retail

Location: South Korea

Customers Affected: 3.6 million

Incident : Data Breach TIFLVMCHR1770865579

Entity Name: Christian Dior Couture Korea

Entity Type: Subsidiary

Industry: Luxury Retail

Location: South Korea

Customers Affected: 1.95 million

Incident : Data Breach TIFLVMCHR1770865579

Entity Name: Tiffany Korea

Entity Type: Subsidiary

Industry: Luxury Retail

Location: South Korea

Customers Affected: 4,600

Incident : Data Breach LOUPARVOLTIFJAP1770908674

Entity Name: Louis Vuitton Korea

Entity Type: Subsidiary

Industry: Luxury Retail

Location: South Korea

Customers Affected: Millions

Incident : Data Breach LOUPARVOLTIFJAP1770908674

Entity Name: Dior Korea

Entity Type: Subsidiary

Industry: Luxury Retail

Location: South Korea

Customers Affected: Millions

Incident : Data Breach LOUPARVOLTIFJAP1770908674

Entity Name: Tiffany Korea

Entity Type: Subsidiary

Industry: Luxury Retail

Location: South Korea

Customers Affected: Millions

Incident : Data Breach LOUPARVOLTIFJAP1770908674

Entity Name: Japan Airlines

Entity Type: Corporation

Industry: Aviation

Location: Japan

Customers Affected: 28,000

Incident : Data Breach LOUPARVOLTIFJAP1770908674

Entity Name: Volvo Group

Entity Type: Corporation

Industry: Automotive

Customers Affected: 16,991 employees

Incident : Data Breach LOUPARVOLTIFJAP1770908674

Entity Name: Conduent

Entity Type: Corporation

Industry: Business Process Services

Customers Affected: 25 million individuals

Incident : Data Breach CHR1773773151

Entity Name: Christian Dior Inc.

Entity Type: Corporation

Industry: Luxury Fashion

Location: United States

Customers Affected: U.S. individuals who received a breach notification

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Data Breach CHR706072225

Incident Response Plan Activated: True

Containment Measures: Comprehensive investigation and containment measures

Remediation Measures: Enhanced network security measures

Communication Strategy: Customer notifications and dedicated breach response line

Incident : Data Breach LOU0265102090625

Communication Strategy: Public Disclosure (July 2025)

Incident : Regulatory Policy Change CHR2433224091625

Incident Response Plan Activated: Mandatory under new rules (initial report within 30–60 minutes, postmortem within 30 days).

Law Enforcement Notified: Required for 'major' or 'particularly major' incidents (reported to **national cyber info department** and **public security department**).

Communication Strategy: Multi-channel reporting (hotline **12387**, website, WeChat, email).

Enhanced Monitoring: Expected to be adopted by organizations to meet real-time reporting requirements.

Incident : Data Breach CHR1592715093025

Communication Strategy: Official Warning Messages to Users

Incident : Data Breach CHR3163431111725

Incident Response Plan Activated: Yes (ongoing investigation)

Communication Strategy: Customers urged to be mindful of phishing attacks

Incident : Ransomware CHRMAR1769504421

Incident Response Plan Activated: Yes

Containment Measures: Security measures implemented to contain the breach and prevent further spread of the malware

Communication Strategy: Customers advised to monitor their accounts for suspicious activity; updates to be provided as new details emerge

Incident : Data Breach CHR1773773151

Communication Strategy: Breach notifications sent via mail or email

What is the company's incident response plan?

Incident Response Plan: The company's incident response plan is described as Mandatory under new rules (initial report within 30–60 minutes, postmortem within 30 days)., Yes (ongoing investigation), Yes.

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach SEP2372423

Type of Data Compromised: Personal information

Data Encryption: encrypted password

Personally Identifiable Information: first namelast namedate of birthgendere-mail address

Incident : Data Breach LVM852071225

Type of Data Compromised: Names, Contact details, Purchase history

Incident : Data Breach CHR706072225

Type of Data Compromised: Pii, Passport numbers, Government-issued id numbers, Social security numbers

Sensitivity of Data: High

Incident : Data Breach LOU0265102090625

Type of Data Compromised: Personal identifiable information (pii), Transaction histories

Number of Records Exposed: Thousands

Sensitivity of Data: High (Enables identity profiling, fraud, and targeted phishing)

Data Exfiltration: Likely (Data sold on dark web markets)

Personally Identifiable Information: NamesContact DetailsPurchase Histories

Incident : Regulatory Policy Change CHR2433224091625

Data Encryption: Dior Shanghai fined for **lack of encryption** in cross-border data transfers.

Personally Identifiable Information: Threshold for 'particularly major' incidents: **>100 million personal records** leaked.

Incident : Data Breach CHR1592715093025

Type of Data Compromised: Personal information (pi)

Sensitivity of Data: High (Potential for Harassment, Fraud, Identity Theft)

Data Exfiltration: Transferred to Dior Headquarters in France

Incident : Data Breach CHR3163431111725

Type of Data Compromised: Personally identifiable information (pii), Purchase histories, Contact details, Shared preferences

Sensitivity of Data: High (includes PII and purchase histories)

Data Exfiltration: Yes

Personally Identifiable Information: Yes (full names, gender, phone numbers, email addresses, postal addresses)

Incident : Ransomware CHRMAR1769504421

Type of Data Compromised: Customer data

Sensitivity of Data: High (personal details, purchase history, fashion preferences)

Data Encryption: File-encrypting malware involved

Personally Identifiable Information: Names, gender details, phone numbers, email and postal addresses

Incident : Data Breach TIFLVMCHR1770865579

Type of Data Compromised: Names, Phone numbers, Birth dates, Email addresses

Number of Records Exposed: 3.6 million, 1.95 million, 4,600

Sensitivity of Data: Personally Identifiable Information (PII)

Incident : Data Breach LOUPARVOLTIFJAP1770908674

Type of Data Compromised: Personal information

Sensitivity of Data: High

Personally Identifiable Information: Yes

Incident : Data Breach CHR1773773151

Type of Data Compromised: Names, Contact details, Addresses, Dates of birth, Government ids, Social security numbers

Sensitivity of Data: High

Personally Identifiable Information: Yes

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Enhanced network security measures.

How does the company handle incidents involving personally identifiable information (PII) ?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by comprehensive investigation and containment measures and security measures implemented to contain the breach and prevent further spread of the malware.

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : Data Breach CHR1592715093025

Data Exfiltration: True

Incident : Ransomware CHRMAR1769504421

Data Encryption: Yes

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident ?

Incident : Data Breach LVM852071225

Regulatory Notifications: Information Commissioner’s Office

Incident : Data Breach LOU0265102090625

Regulations Violated: Potential GDPR (EU), Potential CCPA (California, USA),

Incident : Regulatory Policy Change CHR2433224091625

Regulations Violated: National Cybersecurity Incident Reporting Management Measures (effective Nov 1, 2024), Cross-border data transfer laws (Dior Shanghai case),

Fines Imposed: Dior Shanghai fined for **unauthorized data transfer** without security screening or encryption.

Legal Actions: Penalties for non-compliant operators (late/false reporting) under CAC rules.

Regulatory Notifications: Mandatory reporting to **CAC**, **public security department**, and potentially other agencies.

Incident : Data Breach CHR1592715093025

Regulations Violated: Personal Information Protection Law (PIPL),

Fines Imposed: ['Administrative Penalty (Details Undisclosed)']

Legal Actions: Regulatory Investigation by China’s Public Security Authority,

Regulatory Notifications: First Administrative Penalty for Unlawful Cross-Border PI Transfer in China

Incident : Data Breach CHR3163431111725

Legal Actions: Criticism from Korean legislators for delayed notification to authorities

Incident : Data Breach TIFLVMCHR1770865579

Regulations Violated: South Korea’s Personal Information Protection Act

Fines Imposed: 36 billion won ($24.9 million)

Incident : Data Breach LOUPARVOLTIFJAP1770908674

Regulations Violated: South Korea privacy laws

Fines Imposed: 36 billion won ($24.9 million)

Incident : Data Breach CHR1773773151

Legal Actions: Class action lawsuit

How does the company ensure compliance with regulatory requirements ?

Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Penalties for non-compliant operators (late/false reporting) under CAC rules., Regulatory Investigation by China’s Public Security Authority, , Criticism from Korean legislators for delayed notification to authorities, Class action lawsuit.

Lessons Learned and Recommendations

What lessons were learned from each incident ?

Incident : Data Breach LOU0265102090625

Lessons Learned: Long-term data retention increases breach risks; implement data minimization strategies., Third-party data-sharing practices require rigorous vetting and accountability controls., Consumer demand for privacy (e.g., GDPR/CCPA requests) is rising; proactive data deletion processes are critical., AI-enhanced phishing leverages breached data (e.g., purchase histories) for hyper-targeted attacks., Data brokers exacerbate risks by monetizing sensitive information (e.g., location tracking).

Incident : Regulatory Policy Change CHR2433224091625

Lessons Learned: Strict deadlines (**30–60 minutes**) require **automated detection** and **prepared response teams**., Cross-border data transfers must comply with **encryption** and **disclosure** requirements., Proactive **government coordination** is critical for 'particularly major' incidents.

Incident : Data Breach CHR1592715093025

Lessons Learned: China’s cross-border data regime has shifted from rulemaking to active enforcement, making compliance an urgent priority for MNCs., MNCs must reassess and localize their data compliance frameworks in China to align with PIPL requirements, which differ substantively from GDPR., Superficial adjustments to global privacy policies (e.g., GDPR-based) are insufficient; clause-by-clause localization is required., Separate user consent for cross-border PI transfers is a unique PIPL requirement and must be explicitly obtained., Luxury brands must elevate data security investments to protect high-value client PI and mitigate reputational/regulatory risks., Technical safeguards (e.g., encryption, de-identification) and PI Protection Impact Assessments (PIPIA) are mandatory for cross-border transfers., Thresholds for regulatory mechanisms (e.g., Security Assessment, SCC Filing) must be evaluated per entity, not at the group level.

Incident : Data Breach LOUPARVOLTIFJAP1770908674

Lessons Learned: Growing regulatory scrutiny over data protection in South Korea and stricter compliance enforcement.

What recommendations were made to prevent future incidents ?

Incident : Data Breach LOU0265102090625

Recommendations: Adopt **data minimization** principles: Retain customer data only as long as legally required., Enhance **third-party risk management**: Audit data-sharing partners for security/compliance., Implement **automated data deletion** workflows to comply with GDPR/CCPA requests efficiently., Educate customers on **privacy controls**: Promote account settings for data deletion, marketing opt-outs, and payment method removal., Monitor **dark web markets** for exposed data and proactively notify affected individuals., Invest in **AI-driven threat detection** to counter phishing campaigns using breached data., Advocate for **strengthened regulations** on data brokers to limit unauthorized data sales.Adopt **data minimization** principles: Retain customer data only as long as legally required., Enhance **third-party risk management**: Audit data-sharing partners for security/compliance., Implement **automated data deletion** workflows to comply with GDPR/CCPA requests efficiently., Educate customers on **privacy controls**: Promote account settings for data deletion, marketing opt-outs, and payment method removal., Monitor **dark web markets** for exposed data and proactively notify affected individuals., Invest in **AI-driven threat detection** to counter phishing campaigns using breached data., Advocate for **strengthened regulations** on data brokers to limit unauthorized data sales.Adopt **data minimization** principles: Retain customer data only as long as legally required., Enhance **third-party risk management**: Audit data-sharing partners for security/compliance., Implement **automated data deletion** workflows to comply with GDPR/CCPA requests efficiently., Educate customers on **privacy controls**: Promote account settings for data deletion, marketing opt-outs, and payment method removal., Monitor **dark web markets** for exposed data and proactively notify affected individuals., Invest in **AI-driven threat detection** to counter phishing campaigns using breached data., Advocate for **strengthened regulations** on data brokers to limit unauthorized data sales.Adopt **data minimization** principles: Retain customer data only as long as legally required., Enhance **third-party risk management**: Audit data-sharing partners for security/compliance., Implement **automated data deletion** workflows to comply with GDPR/CCPA requests efficiently., Educate customers on **privacy controls**: Promote account settings for data deletion, marketing opt-outs, and payment method removal., Monitor **dark web markets** for exposed data and proactively notify affected individuals., Invest in **AI-driven threat detection** to counter phishing campaigns using breached data., Advocate for **strengthened regulations** on data brokers to limit unauthorized data sales.Adopt **data minimization** principles: Retain customer data only as long as legally required., Enhance **third-party risk management**: Audit data-sharing partners for security/compliance., Implement **automated data deletion** workflows to comply with GDPR/CCPA requests efficiently., Educate customers on **privacy controls**: Promote account settings for data deletion, marketing opt-outs, and payment method removal., Monitor **dark web markets** for exposed data and proactively notify affected individuals., Invest in **AI-driven threat detection** to counter phishing campaigns using breached data., Advocate for **strengthened regulations** on data brokers to limit unauthorized data sales.Adopt **data minimization** principles: Retain customer data only as long as legally required., Enhance **third-party risk management**: Audit data-sharing partners for security/compliance., Implement **automated data deletion** workflows to comply with GDPR/CCPA requests efficiently., Educate customers on **privacy controls**: Promote account settings for data deletion, marketing opt-outs, and payment method removal., Monitor **dark web markets** for exposed data and proactively notify affected individuals., Invest in **AI-driven threat detection** to counter phishing campaigns using breached data., Advocate for **strengthened regulations** on data brokers to limit unauthorized data sales.Adopt **data minimization** principles: Retain customer data only as long as legally required., Enhance **third-party risk management**: Audit data-sharing partners for security/compliance., Implement **automated data deletion** workflows to comply with GDPR/CCPA requests efficiently., Educate customers on **privacy controls**: Promote account settings for data deletion, marketing opt-outs, and payment method removal., Monitor **dark web markets** for exposed data and proactively notify affected individuals., Invest in **AI-driven threat detection** to counter phishing campaigns using breached data., Advocate for **strengthened regulations** on data brokers to limit unauthorized data sales.

Incident : Regulatory Policy Change CHR2433224091625

Recommendations: Implement **real-time monitoring** to detect incidents promptly., Establish **clear escalation protocols** for 30/60-minute reporting., Conduct **regular drills** to test incident response plans., Ensure **encryption** and **legal reviews** for cross-border data flows., Leverage **CAC-provided channels** (hotline, WeChat, etc.) for compliance.Implement **real-time monitoring** to detect incidents promptly., Establish **clear escalation protocols** for 30/60-minute reporting., Conduct **regular drills** to test incident response plans., Ensure **encryption** and **legal reviews** for cross-border data flows., Leverage **CAC-provided channels** (hotline, WeChat, etc.) for compliance.Implement **real-time monitoring** to detect incidents promptly., Establish **clear escalation protocols** for 30/60-minute reporting., Conduct **regular drills** to test incident response plans., Ensure **encryption** and **legal reviews** for cross-border data flows., Leverage **CAC-provided channels** (hotline, WeChat, etc.) for compliance.Implement **real-time monitoring** to detect incidents promptly., Establish **clear escalation protocols** for 30/60-minute reporting., Conduct **regular drills** to test incident response plans., Ensure **encryption** and **legal reviews** for cross-border data flows., Leverage **CAC-provided channels** (hotline, WeChat, etc.) for compliance.Implement **real-time monitoring** to detect incidents promptly., Establish **clear escalation protocols** for 30/60-minute reporting., Conduct **regular drills** to test incident response plans., Ensure **encryption** and **legal reviews** for cross-border data flows., Leverage **CAC-provided channels** (hotline, WeChat, etc.) for compliance.

Incident : Data Breach CHR1592715093025

Recommendations: Conduct a comprehensive data mapping exercise to identify cross-border PI transfers and assess regulatory triggers (Security Assessment, SCC Filing, or PI Protection Certification)., Implement localized privacy policies that fully comply with PIPL, including detailed disclosures for overseas recipients and separate consent mechanisms., Adopt technical safeguards such as encryption, de-identification, and access controls for PI handling., Perform a PI Protection Impact Assessment (PIPIA) for all cross-border transfers and retain reports for at least three years., Establish a local office or appoint a representative in China if collecting PI directly from individuals in China (as required by PIPL)., Train employees on PIPL compliance and data security best practices, with a focus on luxury sector risks., Develop and test contingency plans for PI security incidents, including breach notification and regulatory reporting procedures., Monitor regulatory updates (e.g., CAC guidelines) and adjust compliance frameworks proactively to avoid penalties (up to RMB 50 million or 5% of annual turnover)., For luxury brands, prioritize security investments to protect high-net-worth client data and mitigate targeted cyber threats.Conduct a comprehensive data mapping exercise to identify cross-border PI transfers and assess regulatory triggers (Security Assessment, SCC Filing, or PI Protection Certification)., Implement localized privacy policies that fully comply with PIPL, including detailed disclosures for overseas recipients and separate consent mechanisms., Adopt technical safeguards such as encryption, de-identification, and access controls for PI handling., Perform a PI Protection Impact Assessment (PIPIA) for all cross-border transfers and retain reports for at least three years., Establish a local office or appoint a representative in China if collecting PI directly from individuals in China (as required by PIPL)., Train employees on PIPL compliance and data security best practices, with a focus on luxury sector risks., Develop and test contingency plans for PI security incidents, including breach notification and regulatory reporting procedures., Monitor regulatory updates (e.g., CAC guidelines) and adjust compliance frameworks proactively to avoid penalties (up to RMB 50 million or 5% of annual turnover)., For luxury brands, prioritize security investments to protect high-net-worth client data and mitigate targeted cyber threats.Conduct a comprehensive data mapping exercise to identify cross-border PI transfers and assess regulatory triggers (Security Assessment, SCC Filing, or PI Protection Certification)., Implement localized privacy policies that fully comply with PIPL, including detailed disclosures for overseas recipients and separate consent mechanisms., Adopt technical safeguards such as encryption, de-identification, and access controls for PI handling., Perform a PI Protection Impact Assessment (PIPIA) for all cross-border transfers and retain reports for at least three years., Establish a local office or appoint a representative in China if collecting PI directly from individuals in China (as required by PIPL)., Train employees on PIPL compliance and data security best practices, with a focus on luxury sector risks., Develop and test contingency plans for PI security incidents, including breach notification and regulatory reporting procedures., Monitor regulatory updates (e.g., CAC guidelines) and adjust compliance frameworks proactively to avoid penalties (up to RMB 50 million or 5% of annual turnover)., For luxury brands, prioritize security investments to protect high-net-worth client data and mitigate targeted cyber threats.Conduct a comprehensive data mapping exercise to identify cross-border PI transfers and assess regulatory triggers (Security Assessment, SCC Filing, or PI Protection Certification)., Implement localized privacy policies that fully comply with PIPL, including detailed disclosures for overseas recipients and separate consent mechanisms., Adopt technical safeguards such as encryption, de-identification, and access controls for PI handling., Perform a PI Protection Impact Assessment (PIPIA) for all cross-border transfers and retain reports for at least three years., Establish a local office or appoint a representative in China if collecting PI directly from individuals in China (as required by PIPL)., Train employees on PIPL compliance and data security best practices, with a focus on luxury sector risks., Develop and test contingency plans for PI security incidents, including breach notification and regulatory reporting procedures., Monitor regulatory updates (e.g., CAC guidelines) and adjust compliance frameworks proactively to avoid penalties (up to RMB 50 million or 5% of annual turnover)., For luxury brands, prioritize security investments to protect high-net-worth client data and mitigate targeted cyber threats.Conduct a comprehensive data mapping exercise to identify cross-border PI transfers and assess regulatory triggers (Security Assessment, SCC Filing, or PI Protection Certification)., Implement localized privacy policies that fully comply with PIPL, including detailed disclosures for overseas recipients and separate consent mechanisms., Adopt technical safeguards such as encryption, de-identification, and access controls for PI handling., Perform a PI Protection Impact Assessment (PIPIA) for all cross-border transfers and retain reports for at least three years., Establish a local office or appoint a representative in China if collecting PI directly from individuals in China (as required by PIPL)., Train employees on PIPL compliance and data security best practices, with a focus on luxury sector risks., Develop and test contingency plans for PI security incidents, including breach notification and regulatory reporting procedures., Monitor regulatory updates (e.g., CAC guidelines) and adjust compliance frameworks proactively to avoid penalties (up to RMB 50 million or 5% of annual turnover)., For luxury brands, prioritize security investments to protect high-net-worth client data and mitigate targeted cyber threats.Conduct a comprehensive data mapping exercise to identify cross-border PI transfers and assess regulatory triggers (Security Assessment, SCC Filing, or PI Protection Certification)., Implement localized privacy policies that fully comply with PIPL, including detailed disclosures for overseas recipients and separate consent mechanisms., Adopt technical safeguards such as encryption, de-identification, and access controls for PI handling., Perform a PI Protection Impact Assessment (PIPIA) for all cross-border transfers and retain reports for at least three years., Establish a local office or appoint a representative in China if collecting PI directly from individuals in China (as required by PIPL)., Train employees on PIPL compliance and data security best practices, with a focus on luxury sector risks., Develop and test contingency plans for PI security incidents, including breach notification and regulatory reporting procedures., Monitor regulatory updates (e.g., CAC guidelines) and adjust compliance frameworks proactively to avoid penalties (up to RMB 50 million or 5% of annual turnover)., For luxury brands, prioritize security investments to protect high-net-worth client data and mitigate targeted cyber threats.Conduct a comprehensive data mapping exercise to identify cross-border PI transfers and assess regulatory triggers (Security Assessment, SCC Filing, or PI Protection Certification)., Implement localized privacy policies that fully comply with PIPL, including detailed disclosures for overseas recipients and separate consent mechanisms., Adopt technical safeguards such as encryption, de-identification, and access controls for PI handling., Perform a PI Protection Impact Assessment (PIPIA) for all cross-border transfers and retain reports for at least three years., Establish a local office or appoint a representative in China if collecting PI directly from individuals in China (as required by PIPL)., Train employees on PIPL compliance and data security best practices, with a focus on luxury sector risks., Develop and test contingency plans for PI security incidents, including breach notification and regulatory reporting procedures., Monitor regulatory updates (e.g., CAC guidelines) and adjust compliance frameworks proactively to avoid penalties (up to RMB 50 million or 5% of annual turnover)., For luxury brands, prioritize security investments to protect high-net-worth client data and mitigate targeted cyber threats.Conduct a comprehensive data mapping exercise to identify cross-border PI transfers and assess regulatory triggers (Security Assessment, SCC Filing, or PI Protection Certification)., Implement localized privacy policies that fully comply with PIPL, including detailed disclosures for overseas recipients and separate consent mechanisms., Adopt technical safeguards such as encryption, de-identification, and access controls for PI handling., Perform a PI Protection Impact Assessment (PIPIA) for all cross-border transfers and retain reports for at least three years., Establish a local office or appoint a representative in China if collecting PI directly from individuals in China (as required by PIPL)., Train employees on PIPL compliance and data security best practices, with a focus on luxury sector risks., Develop and test contingency plans for PI security incidents, including breach notification and regulatory reporting procedures., Monitor regulatory updates (e.g., CAC guidelines) and adjust compliance frameworks proactively to avoid penalties (up to RMB 50 million or 5% of annual turnover)., For luxury brands, prioritize security investments to protect high-net-worth client data and mitigate targeted cyber threats.Conduct a comprehensive data mapping exercise to identify cross-border PI transfers and assess regulatory triggers (Security Assessment, SCC Filing, or PI Protection Certification)., Implement localized privacy policies that fully comply with PIPL, including detailed disclosures for overseas recipients and separate consent mechanisms., Adopt technical safeguards such as encryption, de-identification, and access controls for PI handling., Perform a PI Protection Impact Assessment (PIPIA) for all cross-border transfers and retain reports for at least three years., Establish a local office or appoint a representative in China if collecting PI directly from individuals in China (as required by PIPL)., Train employees on PIPL compliance and data security best practices, with a focus on luxury sector risks., Develop and test contingency plans for PI security incidents, including breach notification and regulatory reporting procedures., Monitor regulatory updates (e.g., CAC guidelines) and adjust compliance frameworks proactively to avoid penalties (up to RMB 50 million or 5% of annual turnover)., For luxury brands, prioritize security investments to protect high-net-worth client data and mitigate targeted cyber threats.

What are the key lessons learned from past incidents ?

Key Lessons Learned: The key lessons learned from past incidents are Long-term data retention increases breach risks; implement data minimization strategies.,Third-party data-sharing practices require rigorous vetting and accountability controls.,Consumer demand for privacy (e.g., GDPR/CCPA requests) is rising; proactive data deletion processes are critical.,AI-enhanced phishing leverages breached data (e.g., purchase histories) for hyper-targeted attacks.,Data brokers exacerbate risks by monetizing sensitive information (e.g., location tracking).Strict deadlines (**30–60 minutes**) require **automated detection** and **prepared response teams**.,Cross-border data transfers must comply with **encryption** and **disclosure** requirements.,Proactive **government coordination** is critical for 'particularly major' incidents.China’s cross-border data regime has shifted from rulemaking to active enforcement, making compliance an urgent priority for MNCs.,MNCs must reassess and localize their data compliance frameworks in China to align with PIPL requirements, which differ substantively from GDPR.,Superficial adjustments to global privacy policies (e.g., GDPR-based) are insufficient; clause-by-clause localization is required.,Separate user consent for cross-border PI transfers is a unique PIPL requirement and must be explicitly obtained.,Luxury brands must elevate data security investments to protect high-value client PI and mitigate reputational/regulatory risks.,Technical safeguards (e.g., encryption, de-identification) and PI Protection Impact Assessments (PIPIA) are mandatory for cross-border transfers.,Thresholds for regulatory mechanisms (e.g., Security Assessment, SCC Filing) must be evaluated per entity, not at the group level.Growing regulatory scrutiny over data protection in South Korea and stricter compliance enforcement.

What recommendations has the company implemented to improve cybersecurity ?

Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Conduct **regular drills** to test incident response plans., Ensure **encryption** and **legal reviews** for cross-border data flows., Establish **clear escalation protocols** for 30/60-minute reporting., Leverage **CAC-provided channels** (hotline, WeChat, etc.) for compliance. and Implement **real-time monitoring** to detect incidents promptly..

References

Where can I find more information about each incident ?

Incident : Data Breach LVM852071225

Source: Bloomberg

Incident : Data Breach CHR706072225

Source: Dior Official Notification

Incident : Data Breach LOU0265102090625

Source: LOKKER (Ian Cohen, CEO)

Incident : Data Breach LOU0265102090625

Source: DataGrail (2025 Data Deletion Report)

Incident : Data Breach LOU0265102090625

Source: UBC Sauder School of Business (Dr. Joy Wu)

Incident : Data Breach LOU0265102090625

Source: SEC Employee Tracking Study (Location Data Brokers)

Incident : Regulatory Policy Change CHR2433224091625

Source: The Register

URL: https://www.theregister.com/2024/10/01/china_cybersecurity_reporting_rules/

Date Accessed: 2024-10-01

Incident : Regulatory Policy Change CHR2433224091625

Source: Cyberspace Administration of China (CAC)

URL: http://www.cac.gov.cn/

Date Accessed: 2024-10-01

Incident : Data Breach CHR1592715093025

Source: China’s Cyberspace Administration (CAC) - Personal Information Protection Law (PIPL)

Incident : Data Breach CHR1592715093025

Source: Guangzhou Internet Court Judgment (Accor Case, September 2023)

Incident : Data Breach CHR1592715093025

Source: Measures for Security Assessment of Outbound Data Transfers (Effective September 1, 2022)

Incident : Data Breach CHR1592715093025

Source: Measures on Standard Contracts for Cross-Border Transfers of PI (Effective June 1, 2023)

Incident : Data Breach CHR1592715093025

Source: Provisions on Promoting and Regulating Cross-Border Data Flows (Effective March 22, 2024)

Incident : Data Breach CHR3163431111725

Source: BleepingComputer

Incident : Ransomware CHRMAR1769504421

Source: Cyber Incident Description

Incident : Data Breach TIFLVMCHR1770865579

Source: Personal Information Protection Commission (PIPC)

Incident : Data Breach LOUPARVOLTIFJAP1770908674

Source: Cyber Incident Description

Incident : Data Breach CHR1773773151

Source: Class action settlement notice

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Bloomberg, and Source: Dior Official Notification, and Source: LOKKER (Ian Cohen, CEO), and Source: DataGrail (2025 Data Deletion Report), and Source: UBC Sauder School of Business (Dr. Joy Wu), and Source: SEC Employee Tracking Study (Location Data Brokers), and Source: The RegisterUrl: https://www.theregister.com/2024/10/01/china_cybersecurity_reporting_rules/Date Accessed: 2024-10-01, and Source: Cyberspace Administration of China (CAC)Url: http://www.cac.gov.cn/Date Accessed: 2024-10-01, and Source: China’s Cyberspace Administration (CAC) - Personal Information Protection Law (PIPL), and Source: Guangzhou Internet Court Judgment (Accor Case, September 2023), and Source: Measures for Security Assessment of Outbound Data Transfers (Effective September 1, 2022), and Source: Measures on Standard Contracts for Cross-Border Transfers of PI (Effective June 1, 2023), and Source: Provisions on Promoting and Regulating Cross-Border Data Flows (Effective March 22, 2024), and Source: BleepingComputer, and Source: Cyber Incident Description, and Source: Personal Information Protection Commission (PIPC), and Source: Cyber Incident Description, and Source: Class action settlement notice.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : Data Breach CHR706072225

Investigation Status: Completed

Incident : Data Breach LOU0265102090625

Investigation Status: Disclosed (July 2025); details limited

Incident : Regulatory Policy Change CHR2433224091625

Investigation Status: Ongoing (regulatory framework rollout; Dior case resolved with fine).

Incident : Data Breach CHR1592715093025

Investigation Status: Completed (Administrative Penalty Imposed)

Incident : Data Breach CHR3163431111725

Investigation Status: Ongoing

Incident : Ransomware CHRMAR1769504421

Investigation Status: Ongoing

Incident : Data Breach TIFLVMCHR1770865579

Investigation Status: Completed

Incident : Data Breach CHR1773773151

Investigation Status: Settled

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Customer notifications and dedicated breach response line, Public Disclosure (July 2025), Multi-channel reporting (hotline **12387**, website, WeChat, email)., Official Warning Messages To Users, Customers urged to be mindful of phishing attacks, Customers advised to monitor their accounts for suspicious activity; updates to be provided as new details emerge and Breach notifications sent via mail or email.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Data Breach CHR706072225

Customer Advisories: Dedicated breach response line: 1-833-918-5938, engagement number B147873

Incident : Data Breach LOU0265102090625

Customer Advisories: Review/account privacy settings for data deletion options.Submit formal data deletion requests (cite GDPR/CCPA if applicable).Remove saved payment methods/addresses to limit exposure.Monitor financial accounts for fraudulent activity.

Incident : Regulatory Policy Change CHR2433224091625

Stakeholder Advisories: Network operators must prepare for **Nov 1 enforcement**; government agencies to monitor compliance.

Incident : Data Breach CHR1592715093025

Stakeholder Advisories: Mncs Operating In China Must Urgently Review Cross-Border Data Transfer Practices To Ensure Compliance With Pipl., Luxury Brands Should Treat This Case As A Warning To Strengthen Data Security And Localization Efforts., Legal And Compliance Teams Should Collaborate To Align Global Privacy Policies With Pipl’S Substantive Requirements..

Customer Advisories: Users in China received official warning messages from Dior regarding the data breach.Consumers are advised to monitor for potential harassment, spam, or fraud resulting from the breach.Affected individuals may have recourse for damages under PIPL (as demonstrated in the Accor case).

Incident : Data Breach CHR3163431111725

Stakeholder Advisories: Customers advised to be cautious of phishing attempts

Customer Advisories: Customers urged to be mindful of potential phishing attacks due to data exposure

Incident : Ransomware CHRMAR1769504421

Customer Advisories: Monitor accounts for suspicious activity; stolen data may be exploited in phishing schemes over the next 6 to 12 months

Incident : Data Breach CHR1773773151

Customer Advisories: Breach notifications sent to affected U.S. consumers with compensation details

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Dedicated breach response line: 1-833-918-5938, engagement number B147873, Review/Account Privacy Settings For Data Deletion Options., Submit Formal Data Deletion Requests (Cite Gdpr/Ccpa If Applicable)., Remove Saved Payment Methods/Addresses To Limit Exposure., Monitor Financial Accounts For Fraudulent Activity., , Network operators must prepare for **Nov 1 enforcement**; government agencies to monitor compliance., Mncs Operating In China Must Urgently Review Cross-Border Data Transfer Practices To Ensure Compliance With Pipl., Luxury Brands Should Treat This Case As A Warning To Strengthen Data Security And Localization Efforts., Legal And Compliance Teams Should Collaborate To Align Global Privacy Policies With Pipl’S Substantive Requirements., Users In China Received Official Warning Messages From Dior Regarding The Data Breach., Consumers Are Advised To Monitor For Potential Harassment, Spam, Or Fraud Resulting From The Breach., Affected Individuals May Have Recourse For Damages Under Pipl (As Demonstrated In The Accor Case)., , Customers advised to be cautious of phishing attempts, Customers urged to be mindful of potential phishing attacks due to data exposure, Monitor accounts for suspicious activity; stolen data may be exploited in phishing schemes over the next 6 to 12 months and Breach notifications sent to affected U.S. consumers with compensation details.

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Data Breach CHR706072225

Entry Point: Customer database systems

Incident : Data Breach LOU0265102090625

High Value Targets: High-Net-Worth Individuals (Via Purchase Histories),

Data Sold on Dark Web: High-Net-Worth Individuals (Via Purchase Histories),

Incident : Data Breach CHR1592715093025

High Value Targets: Personal Information Of High-Net-Worth Clients,

Data Sold on Dark Web: Personal Information Of High-Net-Worth Clients,

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Data Breach CHR706072225

Corrective Actions: Enhanced network security measures

Incident : Data Breach LOU0265102090625

Root Causes: Over-Retention Of Customer Data Without Clear Deletion Policies., Insufficient Oversight Of Third-Party Data-Sharing Ecosystems., Lack Of Proactive Monitoring For Dark Web Data Leaks.,

Incident : Regulatory Policy Change CHR2433224091625

Root Causes: Lack Of **Real-Time Detection** Capabilities In Some Organizations., Inadequate **Cross-Border Data Protection** (E.G., Dior Case)., Potential **Underreporting** Due To Fear Of Penalties.,

Corrective Actions: Mandatory **30-Day Postmortem** Reports For Major Incidents., **Fines And Legal Actions** For Non-Compliance., Expanded **Reporting Channels** To Reduce Ignorance Claims.,

Incident : Data Breach CHR1592715093025

Root Causes: Failure To Complete A Cross-Border Data Transfer Security Assessment Or File A Standard Contract (Scc) With Provincial Authorities., Inadequate User Notice And Lack Of ‘Separate Consent’ For Pi Transfers To Dior’S Headquarters In France., Absence Of Technical Safeguards (E.G., Encryption, De-Identification) For Collected Pi., Overreliance On Gdpr-Based Global Privacy Policies Without Sufficient Localization For Pipl Compliance., Insufficient Attention To Data Security In The Luxury Sector, Where High-Value Client Pi Is A Prime Target For Hackers.,

Corrective Actions: Implement Pipl-Compliant Cross-Border Transfer Mechanisms (Security Assessment, Scc Filing, Or Pi Protection Certification)., Revise Privacy Policies To Include Pipl-Mandated Disclosures (E.G., Overseas Recipient Details, Separate Consent Requirements)., Deploy Encryption, De-Identification, And Access Controls For Pi Handling., Conduct Regular Pi Protection Impact Assessments (Pipia) And Retain Documentation For Audits., Establish A China-Specific Data Compliance Team To Monitor Regulatory Updates And Enforcement Trends., Enhance Incident Response Capabilities To Detect And Mitigate Breaches Promptly.,

Incident : Data Breach TIFLVMCHR1770865579

Root Causes: Poor Security Practices For Remote Logins, Phishing Attacks,

Incident : Data Breach CHR1773773151

Root Causes: Alleged inadequate cybersecurity protections

What is the company's process for conducting post-incident analysis ?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Expected to be adopted by organizations to meet real-time reporting requirements..

What corrective actions has the company taken based on post-incident analysis ?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Enhanced network security measures, Mandatory **30-Day Postmortem** Reports For Major Incidents., **Fines And Legal Actions** For Non-Compliance., Expanded **Reporting Channels** To Reduce Ignorance Claims., , Implement Pipl-Compliant Cross-Border Transfer Mechanisms (Security Assessment, Scc Filing, Or Pi Protection Certification)., Revise Privacy Policies To Include Pipl-Mandated Disclosures (E.G., Overseas Recipient Details, Separate Consent Requirements)., Deploy Encryption, De-Identification, And Access Controls For Pi Handling., Conduct Regular Pi Protection Impact Assessments (Pipia) And Retain Documentation For Audits., Establish A China-Specific Data Compliance Team To Monitor Regulatory Updates And Enforcement Trends., Enhance Incident Response Capabilities To Detect And Mitigate Breaches Promptly., .

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident were an Unspecified third party and External Actor.

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2023-07-02.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-09-09.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were first name, last name, date of birth, gender, e-mail address, encrypted password, , Names, Contact Details, Purchase History, , names, addresses, dates of birth, passport numbers, government-issued ID numbers, Social Security numbers, , Names, Contact Details, Purchase Histories, Potential Addresses, , Personal Information (PI) of Users in China, , Full names, Gender, Phone numbers, Email addresses, Postal addresses, Purchase histories, Contact details, Shared preferences, , Names, gender details, phone numbers, email and postal addresses, purchase history, fashion preferences categorized by gender and age, , Personal information of millions of customers, Sensitive customer information, including names, contact details, addresses, dates of birth, government IDs and and Social Security numbers.

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident were database serving Southeast Asia, Hong Kong SAR, and Australia/New Zealand customers and and .

Response to the Incidents

What containment measures were taken in the most recent incident ?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Comprehensive investigation and containment measures and Security measures implemented to contain the breach and prevent further spread of the malware.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were encrypted password, Purchase Histories, gender, Personal information of millions of customers, Potential Addresses, Shared preferences, names, Purchase History, Names, gender details, phone numbers, email and postal addresses, purchase history, fashion preferences categorized by gender and age, Purchase histories, date of birth, addresses, first name, Phone numbers, Personal Information (PI) of Users in China, Contact Details, passport numbers, Contact details, Sensitive customer information, including names, contact details, addresses, dates of birth, government IDs, and Social Security numbers, e-mail address, dates of birth, Social Security numbers, Names, government-issued ID numbers, Gender, Email addresses, Postal addresses, last name and Full names.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 5.6M.

Regulatory Compliance

What was the highest fine imposed for a regulatory violation ?

Highest Fine Imposed: The highest fine imposed for a regulatory violation was Dior Shanghai fined for **unauthorized data transfer** without security screening or encryption., Administrative Penalty (Details Undisclosed), , 36 billion won ($24.9 million), 36 billion won ($24.9 million).

What was the most significant legal action taken for a regulatory violation ?

Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Penalties for non-compliant operators (late/false reporting) under CAC rules., Regulatory Investigation by China’s Public Security Authority, , Criticism from Korean legislators for delayed notification to authorities, Class action lawsuit.

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents ?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was Thresholds for regulatory mechanisms (e.g., Security Assessment, SCC Filing) must be evaluated per entity, not at the group level., Growing regulatory scrutiny over data protection in South Korea and stricter compliance enforcement.

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Advocate for **strengthened regulations** on data brokers to limit unauthorized data sales., Conduct **regular drills** to test incident response plans., Establish **clear escalation protocols** for 30/60-minute reporting., Educate customers on **privacy controls**: Promote account settings for data deletion, marketing opt-outs, and payment method removal., For luxury brands, prioritize security investments to protect high-net-worth client data and mitigate targeted cyber threats., Monitor regulatory updates (e.g., CAC guidelines) and adjust compliance frameworks proactively to avoid penalties (up to RMB 50 million or 5% of annual turnover)., Conduct a comprehensive data mapping exercise to identify cross-border PI transfers and assess regulatory triggers (Security Assessment, SCC Filing, or PI Protection Certification)., Train employees on PIPL compliance and data security best practices, with a focus on luxury sector risks., Adopt **data minimization** principles: Retain customer data only as long as legally required., Perform a PI Protection Impact Assessment (PIPIA) for all cross-border transfers and retain reports for at least three years., Invest in **AI-driven threat detection** to counter phishing campaigns using breached data., Develop and test contingency plans for PI security incidents, including breach notification and regulatory reporting procedures., Ensure **encryption** and **legal reviews** for cross-border data flows., Adopt technical safeguards such as encryption, de-identification, and access controls for PI handling., Implement **automated data deletion** workflows to comply with GDPR/CCPA requests efficiently., Leverage **CAC-provided channels** (hotline, WeChat, etc.) for compliance., Enhance **third-party risk management**: Audit data-sharing partners for security/compliance., Implement localized privacy policies that fully comply with PIPL, including detailed disclosures for overseas recipients and separate consent mechanisms., Monitor **dark web markets** for exposed data and proactively notify affected individuals., Establish a local office or appoint a representative in China if collecting PI directly from individuals in China (as required by PIPL). and Implement **real-time monitoring** to detect incidents promptly..

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are SEC Employee Tracking Study (Location Data Brokers), Bloomberg, DataGrail (2025 Data Deletion Report), Dior Official Notification, The Register, China’s Cyberspace Administration (CAC) - Personal Information Protection Law (PIPL), Cyberspace Administration of China (CAC), Guangzhou Internet Court Judgment (Accor Case, September 2023), Cyber Incident Description, Personal Information Protection Commission (PIPC), Class action settlement notice, BleepingComputer, Measures for Security Assessment of Outbound Data Transfers (Effective September 1, 2022), LOKKER (Ian Cohen, CEO), UBC Sauder School of Business (Dr. Joy Wu), Provisions on Promoting and Regulating Cross-Border Data Flows (Effective March 22, 2024), Measures on Standard Contracts for Cross-Border Transfers of PI (Effective June 1 and 2023).

What is the most recent URL for additional resources on cybersecurity best practices ?

Most Recent URL for Additional Resources: The most recent URL for additional resources on cybersecurity best practices is https://www.theregister.com/2024/10/01/china_cybersecurity_reporting_rules/, http://www.cac.gov.cn/ .

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Completed.

Stakeholder and Customer Advisories

What was the most recent stakeholder advisory issued ?

Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Network operators must prepare for **Nov 1 enforcement**; government agencies to monitor compliance., MNCs operating in China must urgently review cross-border data transfer practices to ensure compliance with PIPL., Luxury brands should treat this case as a warning to strengthen data security and localization efforts., Legal and compliance teams should collaborate to align global privacy policies with PIPL’s substantive requirements., Customers advised to be cautious of phishing attempts, .

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued were an Dedicated breach response line: 1-833-918-5938, engagement number B147873, Review/account privacy settings for data deletion options.Submit formal data deletion requests (cite GDPR/CCPA if applicable).Remove saved payment methods/addresses to limit exposure.Monitor financial accounts for fraudulent activity., Users in China received official warning messages from Dior regarding the data breach.Consumers are advised to monitor for potential harassment, spam, or fraud resulting from the breach.Affected individuals may have recourse for damages under PIPL (as demonstrated in the Accor case)., Customers urged to be mindful of potential phishing attacks due to data exposure, Monitor accounts for suspicious activity; stolen data may be exploited in phishing schemes over the next 6 to 12 months and Breach notifications sent to affected U.S. consumers with compensation details.

Initial Access Broker

What was the most recent entry point used by an initial access broker ?

Most Recent Entry Point: The most recent entry point used by an initial access broker was an Customer database systems.

Post-Incident Analysis

What was the most significant root cause identified in post-incident analysis ?

Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Over-retention of customer data without clear deletion policies.Insufficient oversight of third-party data-sharing ecosystems.Lack of proactive monitoring for dark web data leaks., Lack of **real-time detection** capabilities in some organizations.Inadequate **cross-border data protection** (e.g., Dior case).Potential **underreporting** due to fear of penalties., Failure to complete a cross-border data transfer security assessment or file a standard contract (SCC) with provincial authorities.Inadequate user notice and lack of ‘separate consent’ for PI transfers to Dior’s headquarters in France.Absence of technical safeguards (e.g., encryption, de-identification) for collected PI.Overreliance on GDPR-based global privacy policies without sufficient localization for PIPL compliance.Insufficient attention to data security in the luxury sector, where high-value client PI is a prime target for hackers., Poor security practices for remote loginsPhishing attacks, Alleged inadequate cybersecurity protections.

What was the most significant corrective action taken based on post-incident analysis ?

Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Enhanced network security measures, Mandatory **30-day postmortem** reports for major incidents.**Fines and legal actions** for non-compliance.Expanded **reporting channels** to reduce ignorance claims., Implement PIPL-compliant cross-border transfer mechanisms (Security Assessment, SCC Filing, or PI Protection Certification).Revise privacy policies to include PIPL-mandated disclosures (e.g., overseas recipient details, separate consent requirements).Deploy encryption, de-identification, and access controls for PI handling.Conduct regular PI Protection Impact Assessments (PIPIA) and retain documentation for audits.Establish a China-specific data compliance team to monitor regulatory updates and enforcement trends.Enhance incident response capabilities to detect and mitigate breaches promptly..

cve

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:N/A:P
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=louis-vuitton' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge