Canada Goose says leaked customer transaction data did not come from company systems

Luxury winter coat manufacturer Canada Goose said recent claims of data stolen from the company are not related to any recent breach of its systems. 

On Saturday afternoon, the ShinyHunters cybercriminal organization claimed to have stolen more than 600,000 records from the company containing personal information. 

In a statement to Recorded Future News, a Canada Goose spokesperson said it is aware that “a historical dataset relating to past customer transactions has recently been published online.”

“At this time, we have no indication of any breach of our own systems. We are currently reviewing the newly released dataset to assess its accuracy and scope and will take any further steps as may be appropriate,” the spokesperson said. “To be clear, our review shows no evidence that unmasked financial data was involved.”

The Canada-based company is one of the largest manufacturers of outwear in the world and reported about $1.3 billion in earnings last fiscal year. 

The ShinyHunters organization has continued a long-running string of high-profile cyberattacks on prominent companies dating back to early 2025. 

After a relative lull in activity during the holiday season, the hackers claimed to have stolen millions of records from Harvard University and the University of Pennsylvania in early February. 

Harvard declined to comment on the theft but the University of Pennsylvania said it is in the process of analyzing the stolen data and notifying anyone impacted by the data breach, which several experts tied to recent cyberattacks involving both universities

Incident responders from Google said in January that it saw a recent expansion of ShinyHunter’s activity involving “sophisticated voice phishing (vishing) and victim-branded credential harvesting sites to gain initial access to corporate environments by obtaining single sign-on (SSO) credentials and multi-factor authentication (MFA) codes.”

“While this methodology of targeting identity providers and SaaS platforms is consistent with our prior observations of threat activity preceding ShinyHunters-branded extortion, the breadth of targeted cloud platforms continues to expand as these threat actors seek more sensitive data for extortion,” Google experts explained

“Further, they appear to be escalating their extortion tactics with recent incidents including harassment of victim personnel, among other tactics.”

Google responded to incidents in the middle of January where the hackers pretended to be IT staff and called employees of organizations claiming the company was updating its multifactor authentication settings — ordering them to enter their previous credentials into hacker-controlled sites made to look legitimate. 

The hackers used the login information to not only steal data but to take over internal email accounts and send phishing emails to cryptocurrency companies. 

Members of ShinyHunters were previously accused of launching hacking campaigns against various industries last summer before a spate of arrests slowed them down. 

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies

Next Post

Polish police detain alleged cybercriminal with Phobos ransomware ties

Related Posts

The Hidden Risk of Orphan Accounts

The Problem: The Identities Left Behind As organizations grow and evolve, employees, contractors, services, and systems come and go - but their accounts often remain. These abandoned or “orphan” accounts sit dormant across applications, platforms, assets, and cloud consoles. The reason they persist isn’t negligence - it’s fragmentation.  Traditional IAM and IGA systems are designed
Read More

Fortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Execution

Fortinet has released security updates to address a critical flaw impacting FortiClientEMS that could lead to the execution of arbitrary code on susceptible systems. The vulnerability, tracked as CVE-2026-21643, has a CVSS rating of 9.1 out of a maximum of 10.0. "An improper neutralization of special elements used in an SQL Command ('SQL Injection') vulnerability [CWE-89] in FortiClientEMS may
Read More

Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool

Cybersecurity researchers have disclosed details of a malicious Google Chrome extension that's capable of stealing API keys associated with MEXC, a centralized cryptocurrency exchange (CEX) available in over 170 countries, while masquerading as a tool to automate trading on the platform. The extension, named MEXC API Automator (ID: pppdfgkfdemgfknfnhpkibbkabhghhfh), has 29 downloads and is still
Read More