Louis Vuitton confirms global data breach affecting UK, South Korea, and Turkey customers. Critical Wing FTP Server vulnerability actively exploited with CISA warning. Romanian authorities arrest 13 in £47 million UK tax phishing operation.
Parspec has secured $20 million in Series A funding to scale its AI-powered platform that automates quoting, submittals, and product selection for construction distributors. Already adopted by industry giants, Parspec is transforming one of the sector’s most outdated workflows.
UK teens arrested over £300M retail cyberattacks. CISA confirms CitrixBleed 2 is being exploited and demands urgent patching. McDonald’s exposed 64M job applications through its AI hiring tool using default login credentials.
15th July 2025 Cyber Update: Louis Vuitton Breach Spans Three Countries, Critical FTP Flaw Exploited, Romanian Tax Scam Arrests
Louis Vuitton confirms global data breach affecting UK, South Korea, and Turkey customers. Critical Wing FTP Server vulnerability actively exploited with CISA warning. Romanian authorities arrest 13 in £47 million UK tax phishing operation.
Cyber News Centre's cyber update for 15th July 2025: Louis Vuitton has disclosed a global data breach affecting customers across the UK, South Korea, and Turkey, with attackers accessing systems for nearly a month before detection. Wing FTP Server has confirmed active exploitation of a critical vulnerability that CISA warns "guarantees total server compromise." Meanwhile, Romanian authorities have arrested 13 individuals in connection with a sophisticated phishing campaign that cost UK taxpayers £47 million.
1. Louis Vuitton Global Data Breach Affects Multiple Countries
French luxury retailer Louis Vuitton, owned by LVMH Group, specializes in high-end fashion, leather goods, and accessories with a global customer base spanning premium markets worldwide.
The Update and Why It Matters
Update: Louis Vuitton discovered a security breach on July 2, 2025, that exposed customer personal information across multiple countries including the UK, South Korea, and Turkey. The incident compromised customer names, contact details, and purchase histories, though the company confirmed that passwords, payment card data, and other financial information remained secure.
Attackers maintained access to Louis Vuitton's systems for nearly a month before detection, with approximately 143,000 Turkish residents affected. This marks the third breach of LVMH's systems within three months, indicating a concerning pattern of targeting luxury brands. The breach may be linked to a third-party service provider account, and while no ransomware group has claimed responsibility, public information suggests this was a ransomware attack.
Why it Matters: This latest breach reflects a growing trend where luxury conglomerates are becoming prime targets for sophisticated cyberattacks. As brands like Louis Vuitton operate across multiple regions with complex digital supply chains, they face mounting challenges in securing customer data globally. The international scope of this incident also highlights the urgent need for LVMH and similar companies to align their cybersecurity practices with emerging global standards and regulatory expectations.
2. Critical Wing FTP Server Vulnerability Under Active Exploitation
Wing FTP Server provides file transfer protocol software for Windows, Linux, and macOS, serving thousands of organizations including the U.S. Air Force, Airbus, Sephora, Reuters, and Sony for secure file transfers.
The Update and Why It Matters
Update: The Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2025-47812 to its Known Exploited Vulnerabilities catalog, warning that this Wing FTP Server flaw "guarantees total server compromise" with a maximum 10.0 CVSS severity score. Active exploitation began on July 1, 2025, with federal agencies ordered to patch by August 4. The vulnerability allows attackers to inject arbitrary Lua code through mishandled null bytes in user and admin web interfaces, enabling complete system takeover.
Huntress security researchers observed multiple attackers targeting the same victim systems, attempting to download malicious files, conduct reconnaissance, and install remote monitoring software. Shadowserver Foundation reports approximately 2,000 Wing FTP Server instances exposed globally, while Censys identified 8,103 exposed devices with 5,004 having vulnerable web interfaces.
Why it Matters: File transfer tools represent high-value targets for cybercriminals due to their access to large data repositories and critical business operations. The maximum severity score and CISA's urgent warning underscore the immediate threat to organizations using unpatched systems. With thousands of exposed instances globally and active exploitation confirmed, this vulnerability poses significant risks to critical infrastructure and enterprise operations.
The pattern of targeting file transfer solutions follows previous campaigns against CrushFTP, MOVEit, and GoAnywhere, indicating systematic attacks on data transfer infrastructure that could facilitate large-scale data theft and ransomware deployment across multiple sectors.
3. Romanian Authorities Arrest 13 in UK Tax Phishing Operation
HMRC (His Majesty's Revenue and Customs) serves as the UK's tax collection and customs authority, responsible for collecting taxes and administering various government benefits and payments for millions of British citizens.
The Update and Why It Matters
Update: Romanian police arrested 13 individuals aged 23-53 in the counties of Ilfov, Giurgiu, and Calarasi on July 10, 2025, in connection with a sophisticated phishing campaign targeting UK's HMRC tax service. The operation involved over 100 Romanian police officers working alongside HMRC investigators in a joint investigation coordinated by the Prosecutor's Office attached to the Court of Appeal in Bucharest and the UK's Crown Prosecution Service.
The suspects face charges of computer fraud, money laundering, and illegal access to computer systems after allegedly stealing personal data to submit fraudulent PAYE claims, VAT repayments, and Child Benefit payments. The campaign affected 100,000 HMRC customers and resulted in £47 million in losses to UK taxpayers, with HMRC confirming it was the third most spoofed UK government body in 2022 behind the NHS and TV Licensing.
Why it Matters: This international law enforcement operation demonstrates the global nature of cybercrime and the necessity for cross-border cooperation in combating sophisticated fraud schemes. The £47 million loss and 100,000 affected customers highlight the massive scale of modern phishing operations targeting government services. HMRC's position as the third most spoofed UK government entity indicates systematic targeting of critical public services that citizens rely on for essential transactions.
The successful arrests show that international cooperation can effectively disrupt cybercriminal networks, but the scale of the operation suggests that similar campaigns may be targeting other government services across multiple countries, requiring enhanced vigilance and coordinated defense strategies.
Get the stories that matter to you. Subscribe to Cyber News Centre and update your preferences to follow our Daily 4min Cyber Update, Innovative AI Startups, The AI Diplomat series, or the main Cyber News Centre newsletter — featuring in-depth analysis on major cyber incidents, tech breakthroughs, global policy, and AI developments that impact cybersecurity.
Sign up for Cyber News Centre
Where cybersecurity meets innovation, the CNC team delivers AI and tech breakthroughs for our digital future. We analyze incidents, data, and insights to keep you informed, secure, and ahead.
UK teens arrested over £300M retail cyberattacks. CISA confirms CitrixBleed 2 is being exploited and demands urgent patching. McDonald’s exposed 64M job applications through its AI hiring tool using default login credentials.
Microsoft patches 137 vulnerabilities including critical SPNEGO flaw, SAP addresses record 27 security notes with maximum CVSS 10.0 vulnerability, while 2.3 million users fall victim to sophisticated browser extension hijacking campaign.
Samsung rolled out a critical Galaxy update fixing 38 flaws, including a serious chip vulnerability, while Google issued no Android patches for July. Ingram Micro recovered from a ransomware attack, and Nippon Steel Solutions disclosed a March breach involving stolen corporate data.
Where cybersecurity meets innovation, the CNC team delivers AI and tech breakthroughs for our digital future. We analyze incidents, data, and insights to keep you informed, secure, and ahead. Sign up for free!