Up to 6 million customers
On February 11, 2026, Dutch telecommunications giant Odido confirmed it has sustained a significant data breach originating from a third-party supplier. An unauthorized party gained access to a customer data environment managed by the supplier, potentially exposing the sensitive personal information of up to six million Odido customers. The exposed data is reported to include names, addresses, contact details, and, for some customers, highly sensitive bank account and passport numbers. This incident represents a critical failure in supply chain security and places millions of individuals at high risk of identity theft and fraud. Odido has initiated its incident response plan and is facing intense scrutiny under the General Data Protection Regulation (GDPR), which could lead to substantial financial penalties.
The breach did not impact Odido's core telecommunications network, but the compromise of the data itself is the primary issue.
The root cause is a failure of security at a third-party supplier. This scenario is increasingly common as organizations outsource data management and other functions. The initial intrusion likely occurred at the supplier through common vectors such as:
Once the attacker gained access to the supplier's system (T1190 - Exploit Public-Facing Application or T1078 - Valid Accounts), they located and exfiltrated the Odido customer database. The primary malicious activities were likely T1003 - OS Credential Dumping to gain further access within the supplier's network and T1530 - Data from Cloud Storage Object or a similar technique to steal the data.
The key takeaway is the breakdown in third-party risk management. Odido, as the data controller, is ultimately responsible for the security of its customers' data, regardless of where it is processed.
The impact of this breach is multi-faceted and severe:
While this is a breach of a third party, organizations can learn lessons for their own detection and response:
New information clarifies the compromised system as a customer contact system and narrows the scope of exposed data, omitting bank account and passport numbers.
Implement a robust third-party risk management program that includes auditing and assessing the security posture of all suppliers with access to sensitive data.
Ensure sensitive data is encrypted at rest and in transit, and that access to decryption keys is strictly controlled.
Mapped D3FEND Techniques:
Mandate that suppliers provide audit logs for access to your data and ingest those logs into your own SIEM for independent monitoring.
Mapped D3FEND Techniques:
Require suppliers to implement egress filtering to prevent large-scale data exfiltration to unauthorized locations.
Mapped D3FEND Techniques:
Odido announces it has suffered a major data breach via a third-party supplier.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.