ShinyHunters Claims Responsibility for Odido Data Breach Affecting 6.2 Million Customers in the Netherlands

Dutch Telecom Odido Hit by Massive Data Breach; 6.2 Million Customers Exposed

CRITICAL
February 12, 2026
March 6, 2026
6m read
Data BreachPhishingThreat Actor

Impact Scope

People Affected

6.2 million

Affected Companies

OdidoBen

Industries Affected

Telecommunications

Geographic Impact

Netherlands (national)

Related Entities(initial)

Threat Actors

ShinyHunters

Organizations

Autoriteit PersoonsgegevensDutch Public Prosecution Service

Other

Odido BenT-Mobile Netherlands

Full Report(when first published)

Executive Summary

On February 12, 2026, Dutch telecommunications provider Odido (formerly T-Mobile Netherlands) announced it was the victim of a massive cyberattack, resulting in a data breach affecting 6.2 million customers. The incident, which also impacts customers of its subsidiary brand Ben, is one of the largest in Dutch history. Attackers gained access to a customer contact system, exfiltrating a wide range of sensitive Personally Identifiable Information (PII), including bank account numbers and government ID details. The notorious threat actor group ShinyHunters has reportedly claimed responsibility for the attack and leaked the data after a ransom demand was refused. The breach was executed via a multi-stage social engineering attack. Odido has notified the Dutch Data Protection Authority and a criminal investigation is now underway.

Threat Overview

The breach was first detected by Odido during the weekend of February 7-8, 2026. The investigation revealed that threat actors had successfully infiltrated one of the company's customer contact systems and downloaded a large volume of customer data. The attack vector was a multi-stage social engineering campaign that began with phishing emails sent to customer service employees. After gaining an initial foothold, the attackers used impersonation tactics to bypass the company's multi-factor authentication (MFA) controls, granting them access to the sensitive database.

The threat actor group ShinyHunters, known for large-scale data breaches and selling stolen data on dark web forums, claimed responsibility. The group allegedly attempted to extort Odido, and upon the company's refusal to pay the ransom, proceeded to publish the stolen data online in early March 2026.

Technical Analysis

The attack chain demonstrates a sophisticated blend of social engineering and technical exploitation:

  1. Initial Access: The campaign started with targeted phishing emails sent to Odido customer service staff (T1566.001 - Spearphishing Attachment).
  2. Credential Compromise: Employees were tricked into revealing their login credentials.
  3. MFA Bypass: The attackers likely used an MFA fatigue or push-bombing attack, or a real-time phishing proxy (Adversary-in-the-Middle) to intercept the MFA token and gain access to the internal network (T1556.006 - Modify Authentication Process: Multi-Factor Authentication).
  4. Discovery & Access: Once inside, the attackers located and accessed the customer contact system database (T1078 - Valid Accounts).
  5. Exfiltration: The attackers exfiltrated the data from the compromised system to an external location (T1041 - Exfiltration Over C2 Channel).

Impact Assessment

The impact of this breach is severe and far-reaching. With 6.2 million individuals affected, a significant portion of the Dutch population is now at high risk of identity theft, financial fraud, and highly targeted phishing and smishing campaigns. The compromised data is a goldmine for criminals:

  • Full names, addresses, dates of birth, and email addresses can be used for identity verification and account takeovers.
  • Bank account numbers (IBANs) expose victims to direct financial theft and fraudulent transactions.
  • Government ID numbers (passport, driver's license) are extremely valuable for committing sophisticated identity fraud, such as opening new lines of credit or applying for government benefits in the victim's name.

For Odido, the reputational damage is immense, likely leading to significant customer churn, regulatory fines from the Dutch Data Protection Authority under GDPR, and costly recovery efforts. The criminal investigation launched by the Dutch Public Prosecution Service indicates the severity of the incident.

IOCs

No specific technical Indicators of Compromise (e.g., IP addresses, domains, file hashes) have been publicly released.

Detection & Response

  • User Behavior Analytics (UBA): Implement UBA to detect anomalous login behavior, such as logins from unusual locations or at odd hours, and multiple failed MFA attempts followed by a success.
  • Data Access Monitoring: Monitor access to sensitive databases. Alerts should be configured for unusually large queries or data exports, especially when performed by accounts that do not typically perform such actions.
  • Phishing Campaign Detection: Enhance email security gateways to better detect and block sophisticated phishing emails. Monitor for newly registered domains that impersonate corporate login pages.
  • Incident Response: Odido's response included blocking the unauthorized access, reporting to regulators, and notifying customers. This is a standard procedure that all organizations should have in their incident response plan.

Mitigation

  1. Phishing-Resistant MFA: The bypass of MFA highlights the need for stronger, phishing-resistant authentication methods like FIDO2/WebAuthn. Push-based MFA is increasingly being targeted and should be phased out in favor of number matching or hardware security keys.
  2. Employee Security Training: Conduct continuous and rigorous security awareness training for all employees, with a special focus on identifying phishing and social engineering attempts. This should include regular simulations.
  3. Principle of Least Privilege: Access to sensitive customer databases should be strictly controlled. Customer service employees should only have access to the specific data required to perform their jobs, and not the entire database. Bulk data export capabilities should be disabled or heavily restricted and monitored.
  4. Network Segmentation: Segment the network to prevent an attacker who compromises a user's workstation from easily accessing critical data stores. The customer contact system should have been on an isolated network segment with strict access controls.
  5. Data Minimization and Encryption: Store only the data that is absolutely necessary. Sensitive data like government ID numbers and IBANs should be encrypted at rest and in transit, with strict access controls on the decryption keys.

Timeline of Events

1
February 7, 2026
Odido detects unauthorized access to its customer contact system over the weekend.
2
February 12, 2026
Odido publicly confirms the data breach and begins notifying customers.
3
February 12, 2026
This article was published
4
March 1, 2026
Reports indicate ShinyHunters began publishing the stolen data on the dark web in early March.

Article Updates

February 19, 2026

Attackers contacted Odido directly for extortion; passwords, call records, and billing data confirmed secure. New technical observables and national security implications detailed.

March 6, 2026

ShinyHunters publicly leaked millions of Odido customer records on a dark web forum, fulfilling their threat after ransom refusal. This significantly escalates fraud and identity theft risks.

MITRE ATT&CK Mitigations

Implement phishing-resistant MFA, such as FIDO2, to prevent MFA bypass attacks.

Mapped D3FEND Techniques:

Train employees to recognize and report sophisticated social engineering and phishing attempts.

Apply strict access controls and network segmentation to sensitive data repositories.

Mapped D3FEND Techniques:

Use User and Entity Behavior Analytics (UEBA) to detect anomalous access patterns indicative of a compromised account.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

Given that the attackers successfully bypassed Odido's existing MFA, it is critical to upgrade to phishing-resistant authentication methods. Organizations should prioritize the deployment of FIDO2/WebAuthn-compliant authenticators, such as hardware security keys (e.g., YubiKey) or platform authenticators (e.g., Windows Hello, Face ID). These methods bind the authentication to the specific device and origin, making it impossible for credentials stolen via a phishing site to be replayed by an attacker. For legacy systems that do not support FIDO2, implement number matching with push notifications as a minimum baseline, as this requires the user to actively engage and match a number, making it more difficult to fall for simple MFA fatigue attacks. The rollout should be prioritized for all employees, especially those with access to sensitive customer data like the customer service team targeted in this attack.

Deploy a User and Entity Behavior Analytics (UEBA) solution to monitor access to critical data repositories like the customer contact system. This system should establish a baseline of normal access patterns for each user or role. For example, a baseline for a customer service agent might involve accessing 20-30 individual customer records per day. The system should then trigger a high-priority alert if that same user account suddenly attempts to query or export thousands or millions of records, as happened in the Odido breach. This technique moves detection beyond simple authentication events and focuses on post-access behavior, providing a crucial layer of defense to detect a compromised account before mass data exfiltration is complete. Alerts should be integrated directly into the SOC's workflow for immediate investigation.

Conduct a comprehensive review and hardening of all user account permissions, enforcing the principle of least privilege. Specifically for the compromised customer contact system, standard customer service accounts should not have permissions to perform bulk data exports. This capability should be restricted to a very small number of specialized, highly-monitored administrative accounts. For daily tasks, agents' access should be limited to viewing and modifying single customer records at a time. By technically preventing low-level accounts from accessing the entire database, the 'blast radius' of a single compromised account is drastically reduced. This is a fundamental architectural control that would have likely prevented this breach from reaching such a massive scale.

Timeline of Events

1
February 7, 2026

Odido detects unauthorized access to its customer contact system over the weekend.

2
February 12, 2026

Odido publicly confirms the data breach and begins notifying customers.

3
March 1, 2026

Reports indicate ShinyHunters began publishing the stolen data on the dark web in early March.

Sources & References(when first published)

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Data BreachOdidoShinyHuntersNetherlandsTelecommunicationsPIIGDPRSocial EngineeringPhishing

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.