Dutch Telecom Odido Hit by Massive Data Breach; 6.2 Million Customers Exposed

ShinyHunters Claims Responsibility for Odido Data Breach Affecting 6.2 Million Customers in the Netherlands

CRITICAL
February 12, 2026
March 6, 2026
6m read
Data BreachPhishingThreat Actor

Impact Scope

People Affected

6.2 million

Affected Companies

OdidoBen

Industries Affected

Telecommunications

Geographic Impact

Netherlands (national)

Related Entities(initial)

Threat Actors

ShinyHunters

Organizations

Autoriteit PersoonsgegevensDutch Public Prosecution Service

Other

BenOdidoT-Mobile Netherlands

Full Report(when first published)

Executive Summary

On February 12, 2026, Dutch telecommunications provider Odido (formerly T-Mobile Netherlands) announced it was the victim of a massive cyberattack, resulting in a data breach affecting 6.2 million customers. The incident, which also impacts customers of its subsidiary brand Ben, is one of the largest in Dutch history. Attackers gained access to a customer contact system, exfiltrating a wide range of sensitive Personally Identifiable Information (PII), including bank account numbers and government ID details. The notorious threat actor group ShinyHunters has reportedly claimed responsibility for the attack and leaked the data after a ransom demand was refused. The breach was executed via a multi-stage social engineering attack. Odido has notified the Dutch Data Protection Authority and a criminal investigation is now underway.

Threat Overview

The breach was first detected by Odido during the weekend of February 7-8, 2026. The investigation revealed that threat actors had successfully infiltrated one of the company's customer contact systems and downloaded a large volume of customer data. The attack vector was a multi-stage social engineering campaign that began with phishing emails sent to customer service employees. After gaining an initial foothold, the attackers used impersonation tactics to bypass the company's multi-factor authentication (MFA) controls, granting them access to the sensitive database.

The threat actor group ShinyHunters, known for large-scale data breaches and selling stolen data on dark web forums, claimed responsibility. The group allegedly attempted to extort Odido, and upon the company's refusal to pay the ransom, proceeded to publish the stolen data online in early March 2026.

Technical Analysis

The attack chain demonstrates a sophisticated blend of social engineering and technical exploitation:

  1. Initial Access: The campaign started with targeted phishing emails sent to Odido customer service staff (T1566.001 - Spearphishing Attachment).
  2. Credential Compromise: Employees were tricked into revealing their login credentials.
  3. MFA Bypass: The attackers likely used an MFA fatigue or push-bombing attack, or a real-time phishing proxy (Adversary-in-the-Middle) to intercept the MFA token and gain access to the internal network (T1556.006 - Modify Authentication Process: Multi-Factor Authentication).
  4. Discovery & Access: Once inside, the attackers located and accessed the customer contact system database (T1078 - Valid Accounts).
  5. Exfiltration: The attackers exfiltrated the data from the compromised system to an external location (T1041 - Exfiltration Over C2 Channel).

Impact Assessment

The impact of this breach is severe and far-reaching. With 6.2 million individuals affected, a significant portion of the Dutch population is now at high risk of identity theft, financial fraud, and highly targeted phishing and smishing campaigns. The compromised data is a goldmine for criminals:

  • Full names, addresses, dates of birth, and email addresses can be used for identity verification and account takeovers.
  • Bank account numbers (IBANs) expose victims to direct financial theft and fraudulent transactions.
  • Government ID numbers (passport, driver's license) are extremely valuable for committing sophisticated identity fraud, such as opening new lines of credit or applying for government benefits in the victim's name.

For Odido, the reputational damage is immense, likely leading to significant customer churn, regulatory fines from the Dutch Data Protection Authority under GDPR, and costly recovery efforts. The criminal investigation launched by the Dutch Public Prosecution Service indicates the severity of the incident.

IOCs

No specific technical Indicators of Compromise (e.g., IP addresses, domains, file hashes) have been publicly released.

Detection & Response

  • User Behavior Analytics (UBA): Implement UBA to detect anomalous login behavior, such as logins from unusual locations or at odd hours, and multiple failed MFA attempts followed by a success.
  • Data Access Monitoring: Monitor access to sensitive databases. Alerts should be configured for unusually large queries or data exports, especially when performed by accounts that do not typically perform such actions.
  • Phishing Campaign Detection: Enhance email security gateways to better detect and block sophisticated phishing emails. Monitor for newly registered domains that impersonate corporate login pages.
  • Incident Response: Odido's response included blocking the unauthorized access, reporting to regulators, and notifying customers. This is a standard procedure that all organizations should have in their incident response plan.

Mitigation

  1. Phishing-Resistant MFA: The bypass of MFA highlights the need for stronger, phishing-resistant authentication methods like FIDO2/WebAuthn. Push-based MFA is increasingly being targeted and should be phased out in favor of number matching or hardware security keys.
  2. Employee Security Training: Conduct continuous and rigorous security awareness training for all employees, with a special focus on identifying phishing and social engineering attempts. This should include regular simulations.
  3. Principle of Least Privilege: Access to sensitive customer databases should be strictly controlled. Customer service employees should only have access to the specific data required to perform their jobs, and not the entire database. Bulk data export capabilities should be disabled or heavily restricted and monitored.
  4. Network Segmentation: Segment the network to prevent an attacker who compromises a user's workstation from easily accessing critical data stores. The customer contact system should have been on an isolated network segment with strict access controls.
  5. Data Minimization and Encryption: Store only the data that is absolutely necessary. Sensitive data like government ID numbers and IBANs should be encrypted at rest and in transit, with strict access controls on the decryption keys.

Timeline of Events

1
February 7, 2026
Odido detects unauthorized access to its customer contact system over the weekend.
2
February 12, 2026
Odido publicly confirms the data breach and begins notifying customers.
3
February 12, 2026
This article was published
4
March 1, 2026
Reports indicate ShinyHunters began publishing the stolen data on the dark web in early March.

Article Updates

February 19, 2026

Severity increased

Attackers contacted Odido directly for extortion; passwords, call records, and billing data confirmed secure. New technical observables and national security implications detailed.

New details reveal attackers directly contacted Odido for extortion. The company confirmed that passwords, call records, and billing information were not compromised. The update also provides specific cyber observables for detection, including database audit logs and network egress patterns, and highlights potential national security implications due to the widespread leak of government ID details.

March 6, 2026

Severity increased

ShinyHunters publicly leaked millions of Odido customer records on a dark web forum, fulfilling their threat after ransom refusal. This significantly escalates fraud and identity theft risks.

The cybercrime group ShinyHunters has publicly leaked the extensive customer data stolen from Dutch telecom Odido. This action follows Odido's refusal to pay a ransom demand made by the group after the initial breach in February 2026. The leaked data, which includes names, addresses, phone numbers, email addresses, dates of birth, IBAN bank account numbers, and some identification details, is now available on a dark web forum. This development significantly increases the immediate threat of identity theft, financial fraud, and targeted phishing campaigns for the 6.2 million affected customers, moving from a potential threat to an active risk.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Data BreachGDPRNetherlandsOdidoPIIPhishingShinyHuntersSocial EngineeringTelecommunications

📢 Share This Article

Help others stay informed about cybersecurity threats