Pandora, the internationally renowned Danish jewellery retailer, has disclosed a significant data breach affecting its Italian customer base.
The company’s notification suggests that unauthorized actors accessed sensitive personal information, potentially as part of a wider Salesforce data compromise.
While investigations remain ongoing, Pandora has taken preliminary steps to contain the incident and alert impacted individuals.
Pandora confirmed that an unknown threat actor exploited vulnerabilities in the company’s systems, gaining unauthorized access to customer records stored in its Salesforce environment.
To date, only Italian customers have been formally notified, although Pandora has not ruled out the possibility that customers in other regions may also be affected.
The compromised data reportedly includes names, contact information, purchase histories, and loyalty program details. No payment card data—or encrypted cardholder information—is believed to have been exposed, according to Pandora’s initial statement.
Pandora Jewellery Hit by Cyberattack
Security researchers suspect this breach may be connected to a recent surge in attacks targeting organizations using Salesforce, a leading customer relationship management (CRM) platform.
In several other high-profile incidents, threat actors exploited misconfigured Salesforce instances or stolen credentials to harvest downstream customer data.
While Pandora has not officially confirmed the tie, forensic analysis is underway to determine whether the intrusion leveraged similar attack vectors—such as API misconfigurations or compromised administrator accounts.
Pandora’s Response and Next Steps
Upon detecting suspicious activity, Pandora’s security team immediately initiated containment measures, including revoking compromised credentials and hardening access controls across its Salesforce deployment.
The company has engaged a third-party cybersecurity firm to conduct a full-scale investigation, assess the breach’s root cause, and recommend remediation steps.
Additionally, Pandora is offering complimentary credit monitoring and identity-theft protection services to affected Italian customers for one year.
The retailer has also notified relevant data protection authorities and is cooperating with law enforcement to track down the perpetrators.
Pandora emphasized that, despite the breach, it has robust encryption and segmentation protocols that prevented attackers from easily pivoting into its broader IT infrastructure.
Nevertheless, the incident underscores the growing threat posed by supply chain and cloud-based attacks, especially against enterprises reliant on third-party CRM systems.
Key Takeaways for Consumers and Industry
- Vigilance on Phishing Attempts: Customers should remain alert for phishing emails or scam calls purporting to come from Pandora or its partners, as threat actors often use exposed contact details to launch targeted social-engineering attacks.
- Monitor Account Activity: Impacted individuals are advised to review their loyalty program statements and custom alerts for unusual transactions or redemptions.
- Review Data Sharing Settings: Other businesses using Salesforce or similar cloud platforms should audit their configuration settings, enforce multi-factor authentication (MFA), and limit administrative privileges to essential personnel only.
Pandora’s swift disclosure and remediation efforts may help mitigate harm to affected customers, but the incident highlights a persistent cybersecurity challenge: ensuring that third-party systems and integrations are as secure as core IT environments.
As investigations continue, Pandora has pledged to keep customers and stakeholders informed of any substantive developments.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.
.webp?w=356&resize=356,220&ssl=1)




