8.7 million records from Holland America Line alone
The ShinyHunters threat group is conducting a massive ransomware campaign, having listed over 40 victim organizations on its data leak site since January 2026. This widespread operation targets multiple industries, with a focus on retail, insurance, and hospitality. Notable victims include Carnival Corporation, Mytheresa, Pitney Bowes, and Inditex (parent of Zara). The attackers are employing a double-extortion model, exfiltrating large volumes of sensitive data—including customer PII and internal corporate files—and threatening public release to coerce payment. The scale of this campaign highlights a trend of coordinated, multi-victim attacks and presents a significant ongoing risk of data misuse and secondary attacks like spear-phishing.
ShinyHunters has escalated its operations by adopting a ransomware and double-extortion model. The group, historically known for selling stolen databases on dark web forums, now directly extorts its victims. The current campaign demonstrates a broad targeting strategy, impacting a diverse set of global companies. The breach of Carnival Corporation's subsidiary, Holland America Line, reportedly exposed 8.7 million records, underscoring the massive data volumes at risk. The group's leak site serves as a public ledger of their conquests, applying continuous pressure on victims to pay. The exfiltrated data, rich with PII and financial information, is a valuable asset for other cybercriminals, creating a cascading risk of fraud and identity theft.
While the source articles do not detail the specific initial access vectors or malware strains used, campaigns of this nature typically rely on a combination of common TTPs. ShinyHunters and similar groups often leverage:
T1567 - Exfiltration Over Web Service: Data is often exfiltrated to cloud services to blend in with normal traffic.T1486 - Data Encrypted for Impact: The core of the ransomware attack is encrypting files to disrupt operations.T1078 - Valid Accounts: Stolen credentials are a common way for groups like ShinyHunters to gain initial access and move laterally.T1566 - Phishing: Phishing remains a primary initial access vector for large-scale campaigns.The impact on the 40+ affected organizations is multifaceted and severe:
No specific Indicators of Compromise (IOCs) were provided in the source articles.
Security teams should hunt for TTPs common to large-scale ransomware operations:
network_traffic_patternLarge outbound data transfers to cloud storage providers (Mega, Dropbox, etc.)command_line_pattern7z.exe a -p[password] -r [archive_name].7z [data_folder]log_sourceVPN/Remote Access Logsprocess_namerclone.exeD3-UDTA) is key here..zip, .rar, .7z) in unusual locations on servers or workstations.D3-MFA) on all external-facing services (VPN, OWA, RDP) and for privileged accounts to prevent credential stuffing and reuse attacks.D3-SU)) to remediate vulnerabilities in public-facing applications, a common entry point for ransomware.Enforce MFA on all remote access points and sensitive accounts to mitigate credential theft.
Segment the network to limit lateral movement and contain the blast radius of an attack.
Implement comprehensive logging and monitoring to detect anomalous activity like large data transfers or lateral movement.
Train users to recognize and report phishing attempts, a common initial access vector.
Implement mandatory, phishing-resistant Multi-Factor Authentication (MFA) across all remote access solutions (VPNs, RDP gateways), cloud services (O365, G-Suite), and for all privileged accounts. This is one of the most effective controls against attacks leveraging stolen credentials, a common tactic for groups like ShinyHunters. Prioritize FIDO2/WebAuthn hardware tokens or authenticator apps over less secure SMS-based MFA. This measure directly hardens the initial access phase of an attack, significantly increasing the effort required for an attacker to compromise an account even if they possess a valid password.
To counter the double-extortion tactic, organizations must control data exfiltration channels. Implement strict outbound traffic filtering rules on perimeter firewalls and web proxies. Deny all outbound traffic by default and create explicit allow-rules for necessary business communications. Specifically, block traffic to consumer-grade cloud storage providers (e.g., Mega, Dropbox, pCloud) and file-sharing sites from servers and non-essential workstations. Use a forward proxy with SSL/TLS inspection to gain visibility into encrypted traffic and enforce policies. This directly interferes with the attacker's ability to steal data, reducing their leverage for extortion.
Monitor for anomalous activity related to local and domain accounts to detect lateral movement. Ingest authentication logs (Windows Event IDs 4624, 4625, 4776) and process creation logs (Event ID 4688) into a SIEM. Create detection rules for suspicious logon patterns, such as an administrator account logging into multiple workstations in a short period ('logon storm'), use of tools like PsExec or WMI for remote command execution, and credential dumping attempts targeting the LSASS process. This helps detect attackers moving through the network after initial compromise, providing an opportunity for response before they reach their objectives of data exfiltration and encryption.
ShinyHunters begins listing victims from the current campaign on its data leak site.
Carnival Corporation confirms a ransomware attack affecting its Holland America Line subsidiary.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.