ctipilot.chSwitzerland · Europe · Public sector

Inditex (Zara) — ShinyHunters third-party analytics breach, 197,400 EU customers

incident · incident:inditex-zara-breach-2026

Coverage timeline
1
first 2026-05-09 → last 2026-05-09
Briefs
1
1 distinct
Sources cited
2
2 hosts
Sections touched
1
active-threats
Co-occurring entities
1
see Related entities below

Story timeline

  1. 2026-05-09CTI Daily Brief — 2026-05-09
    active-threatsFirst coverage. 197,400 unique email addresses; geographic, purchase history, support ticket data. ShinyHunters claimed access via Anodot analytics platform OAuth tokens against BigQuery. ~140 GB published. AEPD notification status unconfirmed.

Where this entity is cited

  • active-threats1

Source distribution

  • bleepingcomputer.com1 (50%)
  • securityaffairs.com1 (50%)

Related entities

Items in briefs about Inditex (Zara) — ShinyHunters third-party analytics breach, 197,400 EU customers (1)

Inditex (Zara) — ShinyHunters publishes 140 GB; 197,400 EU customer records confirmed via third-party analytics compromise

From CTI Daily Brief — 2026-05-09 · published 2026-05-10 · view item permalink →

Have I Been Pwned confirmed on 2026-05-08 that 197,400 unique email addresses from Inditex (Zara's parent, headquartered in A Coruña, Spain) were exposed following a breach of a former third-party analytics provider. Inditex confirmed attackers accessed customer relationship data — email addresses, geographic locations, purchase history (order IDs and product SKUs), and support ticket content — across international markets (SecurityAffairs, 2026-05-08 · BleepingComputer, 2026-05-08). Names, passwords, payment card data, addresses, and phone numbers were stated to be out of scope. ShinyHunters claimed responsibility, alleging access via compromised authentication tokens for the Anodot analytics platform against BigQuery instances; this claim has not been independently verified. Data publication (approximately 140 GB) followed after Inditex declined to engage. Inditex stated it had "started notifying the relevant authorities" but did not specify which supervisory authority or whether the GDPR Article 33 72-hour notification clock was met; as a Spanish company the lead supervisory authority is the AEPD.

Defender takeaway: Third-party analytics and BI platforms with OAuth or service-account access to production data warehouses (BigQuery, Snowflake, Redshift) represent a persistent supply-chain data-exfiltration vector. Audit delegated access grants for analytics tooling; enforce token scoping and expiry; review whether analytics platform service accounts have read-all access to customer-facing databases.