6.2 million
On February 12, 2026, Dutch telecommunications provider Odido (formerly T-Mobile Netherlands) announced it was the victim of a massive cyberattack, resulting in a data breach affecting 6.2 million customers. The incident, which also impacts customers of its subsidiary brand Ben, is one of the largest in Dutch history. Attackers gained access to a customer contact system, exfiltrating a wide range of sensitive Personally Identifiable Information (PII), including bank account numbers and government ID details. The notorious threat actor group ShinyHunters has reportedly claimed responsibility for the attack and leaked the data after a ransom demand was refused. The breach was executed via a multi-stage social engineering attack. Odido has notified the Dutch Data Protection Authority and a criminal investigation is now underway.
The breach was first detected by Odido during the weekend of February 7-8, 2026. The investigation revealed that threat actors had successfully infiltrated one of the company's customer contact systems and downloaded a large volume of customer data. The attack vector was a multi-stage social engineering campaign that began with phishing emails sent to customer service employees. After gaining an initial foothold, the attackers used impersonation tactics to bypass the company's multi-factor authentication (MFA) controls, granting them access to the sensitive database.
The threat actor group ShinyHunters, known for large-scale data breaches and selling stolen data on dark web forums, claimed responsibility. The group allegedly attempted to extort Odido, and upon the company's refusal to pay the ransom, proceeded to publish the stolen data online in early March 2026.
The attack chain demonstrates a sophisticated blend of social engineering and technical exploitation:
T1566.001 - Spearphishing Attachment).T1556.006 - Modify Authentication Process: Multi-Factor Authentication).T1078 - Valid Accounts).T1041 - Exfiltration Over C2 Channel).The impact of this breach is severe and far-reaching. With 6.2 million individuals affected, a significant portion of the Dutch population is now at high risk of identity theft, financial fraud, and highly targeted phishing and smishing campaigns. The compromised data is a goldmine for criminals:
For Odido, the reputational damage is immense, likely leading to significant customer churn, regulatory fines from the Dutch Data Protection Authority under GDPR, and costly recovery efforts. The criminal investigation launched by the Dutch Public Prosecution Service indicates the severity of the incident.
No specific technical Indicators of Compromise (e.g., IP addresses, domains, file hashes) have been publicly released.
Attackers contacted Odido directly for extortion; passwords, call records, and billing data confirmed secure. New technical observables and national security implications detailed.
New details reveal attackers directly contacted Odido for extortion. The company confirmed that passwords, call records, and billing information were not compromised. The update also provides specific cyber observables for detection, including database audit logs and network egress patterns, and highlights potential national security implications due to the widespread leak of government ID details.
ShinyHunters publicly leaked millions of Odido customer records on a dark web forum, fulfilling their threat after ransom refusal. This significantly escalates fraud and identity theft risks.
The cybercrime group ShinyHunters has publicly leaked the extensive customer data stolen from Dutch telecom Odido. This action follows Odido's refusal to pay a ransom demand made by the group after the initial breach in February 2026. The leaked data, which includes names, addresses, phone numbers, email addresses, dates of birth, IBAN bank account numbers, and some identification details, is now available on a dark web forum. This development significantly increases the immediate threat of identity theft, financial fraud, and targeted phishing campaigns for the 6.2 million affected customers, moving from a potential threat to an active risk.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats