Up to 6 million customers
On February 11, 2026, Dutch telecommunications giant Odido confirmed it has sustained a significant data breach originating from a third-party supplier. An unauthorized party gained access to a customer data environment managed by the supplier, potentially exposing the sensitive personal information of up to six million Odido customers. The exposed data is reported to include names, addresses, contact details, and, for some customers, highly sensitive bank account and passport numbers. This incident represents a critical failure in supply chain security and places millions of individuals at high risk of identity theft and fraud. Odido has initiated its incident response plan and is facing intense scrutiny under the General Data Protection Regulation (GDPR), which could lead to substantial financial penalties.
The breach did not impact Odido's core telecommunications network, but the compromise of the data itself is the primary issue.
The root cause is a failure of security at a third-party supplier. This scenario is increasingly common as organizations outsource data management and other functions. The initial intrusion likely occurred at the supplier through common vectors such as:
Once the attacker gained access to the supplier's system (T1190 - Exploit Public-Facing Application or T1078 - Valid Accounts), they located and exfiltrated the Odido customer database. The primary malicious activities were likely T1003 - OS Credential Dumping to gain further access within the supplier's network and T1530 - Data from Cloud Storage Object or a similar technique to steal the data.
The key takeaway is the breakdown in third-party risk management. Odido, as the data controller, is ultimately responsible for the security of its customers' data, regardless of where it is processed.
The impact of this breach is multi-faceted and severe:
While this is a breach of a third party, organizations can learn lessons for their own detection and response:
New information clarifies the compromised system as a customer contact system and narrows the scope of exposed data, omitting bank account and passport numbers.
Further investigation into the Odido data breach, initially reported on February 11, 2026, has clarified key details. The compromised system is now identified as a 'customer contact system' rather than broadly a 'third-party supplier's system'. Crucially, the updated report specifies that the exfiltrated personal information includes customer names, addresses, and phone numbers, but does not mention bank account or passport numbers, which were previously cited as potentially exposed. This suggests a potentially reduced scope of highly sensitive data compromised, mitigating some of the most severe identity theft risks.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats