Danish jewellery big Pandora has disclosed an information breach after buyer info was stolen in an ongoing Salesforce knowledge theft assault.
Pandora is likely one of the world’s largest jewellery manufacturers, with 2,700 places and over 37,000 workers.
“We write to let you already know that your contact info has been accessed by an unauthorized get together by means of the third get together platforms we use,” reads the Pandora Information Breach Notices despatched to our prospects.
“We’ve stopped entry and additional strengthened safety measures.”
As Forbes first reported, the assault solely stolen the shopper’s title, date of start and e mail handle. No password, ID, or monetary info was made public.

Supply: Reddit
Pandora doesn’t share the names of third-party platforms, however BleepingComputer has discovered that knowledge was stolen from the corporate’s Salesforce database.
Since at the very least January 2025, menace actors have supported desks by working social engineering and phishing campaigns concentrating on company workers.
These assaults are designed to steal Salesforce credentials and trick workers into approving malicious OAuth functions to Salesforce accounts.
Utilizing this entry, menace actors obtain and steal the corporate’s Salesforce database. This database is used to pressure the corporate to pay ransom to forestall knowledge from leaking.
Shinyhunters is an organization that personally forces SleepingComputer, and has confirmed that it’s going to run mass gross sales or leaks of corporations that won’t pay ransom sooner or later, as they did within the Snowflake Information-theft assault.
Risk actors have additionally confirmed that the assault is ongoing, so all companies must assessment Salesforce suggestions for enhancing their accounts.
“Salesforce has not compromised, and the problems mentioned should not as a result of identified vulnerabilities in our platform. Salesforce builds corporate-grade safety into all the things we do, however our prospects play a key position in maintaining our knowledge secure.
“We proceed to encourage all prospects to comply with safety finest practices, together with enabling Multifactor Authentication (MFA), imposing the rules of minimal privilege, and thoroughly managing linked apps. For extra info, go to https://www.salesforce.com/weblog/weblog/protect-against-social-engineering.
Different corporations affected by these assaults embrace Louis Vuitton, Dior, Tiffany & Co, a subsidiary of Adidas, Qantas, Allianz Life and LVMH.
Nonetheless, it’s mentioned that BleepingComputer will stay non-public much more.