6.2 million
On February 12, 2026, Dutch telecommunications provider Odido (formerly T-Mobile Netherlands) announced it was the victim of a massive cyberattack, resulting in a data breach affecting 6.2 million customers. The incident, which also impacts customers of its subsidiary brand Ben, is one of the largest in Dutch history. Attackers gained access to a customer contact system, exfiltrating a wide range of sensitive Personally Identifiable Information (PII), including bank account numbers and government ID details. The notorious threat actor group ShinyHunters has reportedly claimed responsibility for the attack and leaked the data after a ransom demand was refused. The breach was executed via a multi-stage social engineering attack. Odido has notified the Dutch Data Protection Authority and a criminal investigation is now underway.
The breach was first detected by Odido during the weekend of February 7-8, 2026. The investigation revealed that threat actors had successfully infiltrated one of the company's customer contact systems and downloaded a large volume of customer data. The attack vector was a multi-stage social engineering campaign that began with phishing emails sent to customer service employees. After gaining an initial foothold, the attackers used impersonation tactics to bypass the company's multi-factor authentication (MFA) controls, granting them access to the sensitive database.
The threat actor group ShinyHunters, known for large-scale data breaches and selling stolen data on dark web forums, claimed responsibility. The group allegedly attempted to extort Odido, and upon the company's refusal to pay the ransom, proceeded to publish the stolen data online in early March 2026.
The attack chain demonstrates a sophisticated blend of social engineering and technical exploitation:
T1566.001 - Spearphishing Attachment).T1556.006 - Modify Authentication Process: Multi-Factor Authentication).T1078 - Valid Accounts).T1041 - Exfiltration Over C2 Channel).The impact of this breach is severe and far-reaching. With 6.2 million individuals affected, a significant portion of the Dutch population is now at high risk of identity theft, financial fraud, and highly targeted phishing and smishing campaigns. The compromised data is a goldmine for criminals:
For Odido, the reputational damage is immense, likely leading to significant customer churn, regulatory fines from the Dutch Data Protection Authority under GDPR, and costly recovery efforts. The criminal investigation launched by the Dutch Public Prosecution Service indicates the severity of the incident.
No specific technical Indicators of Compromise (e.g., IP addresses, domains, file hashes) have been publicly released.
Attackers contacted Odido directly for extortion; passwords, call records, and billing data confirmed secure. New technical observables and national security implications detailed.
ShinyHunters publicly leaked millions of Odido customer records on a dark web forum, fulfilling their threat after ransom refusal. This significantly escalates fraud and identity theft risks.
Implement phishing-resistant MFA, such as FIDO2, to prevent MFA bypass attacks.
Mapped D3FEND Techniques:
Train employees to recognize and report sophisticated social engineering and phishing attempts.
Apply strict access controls and network segmentation to sensitive data repositories.
Mapped D3FEND Techniques:
Use User and Entity Behavior Analytics (UEBA) to detect anomalous access patterns indicative of a compromised account.
Mapped D3FEND Techniques:
Given that the attackers successfully bypassed Odido's existing MFA, it is critical to upgrade to phishing-resistant authentication methods. Organizations should prioritize the deployment of FIDO2/WebAuthn-compliant authenticators, such as hardware security keys (e.g., YubiKey) or platform authenticators (e.g., Windows Hello, Face ID). These methods bind the authentication to the specific device and origin, making it impossible for credentials stolen via a phishing site to be replayed by an attacker. For legacy systems that do not support FIDO2, implement number matching with push notifications as a minimum baseline, as this requires the user to actively engage and match a number, making it more difficult to fall for simple MFA fatigue attacks. The rollout should be prioritized for all employees, especially those with access to sensitive customer data like the customer service team targeted in this attack.
Deploy a User and Entity Behavior Analytics (UEBA) solution to monitor access to critical data repositories like the customer contact system. This system should establish a baseline of normal access patterns for each user or role. For example, a baseline for a customer service agent might involve accessing 20-30 individual customer records per day. The system should then trigger a high-priority alert if that same user account suddenly attempts to query or export thousands or millions of records, as happened in the Odido breach. This technique moves detection beyond simple authentication events and focuses on post-access behavior, providing a crucial layer of defense to detect a compromised account before mass data exfiltration is complete. Alerts should be integrated directly into the SOC's workflow for immediate investigation.
Conduct a comprehensive review and hardening of all user account permissions, enforcing the principle of least privilege. Specifically for the compromised customer contact system, standard customer service accounts should not have permissions to perform bulk data exports. This capability should be restricted to a very small number of specialized, highly-monitored administrative accounts. For daily tasks, agents' access should be limited to viewing and modifying single customer records at a time. By technically preventing low-level accounts from accessing the entire database, the 'blast radius' of a single compromised account is drastically reduced. This is a fundamental architectural control that would have likely prevented this breach from reaching such a massive scale.
Odido detects unauthorized access to its customer contact system over the weekend.
Odido publicly confirms the data breach and begins notifying customers.
Reports indicate ShinyHunters began publishing the stolen data on the dark web in early March.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.