Shinyhunters Ransomware Targets Zara and Aman Resorts with Data Theft Claims

Shinyhunters Ransomware Group Claims Attacks on Zara and Aman Resorts, Threatens Data Leak

HIGH
April 19, 2026
5m read
RansomwareData BreachThreat Actor

Impact Scope

People Affected

500,000+ customer records

Industries Affected

HospitalityRetail

Related Entities

Threat Actors

Shinyhunters

Products & Tech

Salesforce Google BigQuery

Other

Full Report

Executive Summary

The ransomware group Shinyhunters has claimed responsibility for significant data breaches at two prominent international companies: luxury hotel operator Aman Resorts and fashion giant Zara. In posts made on April 19, 2026, the group asserted it had exfiltrated sensitive data from both organizations and issued a public ultimatum. For Aman Resorts, Shinyhunters claims to possess 500,000 customer records from a compromised Salesforce instance. For Zara, the group alleges access to the company's Google BigQuery data, reportedly gained via a vulnerability in the Anodot.com business intelligence platform. The threat actor has set a deadline of April 21, 2026, for both companies to negotiate, threatening to leak the stolen data and cause further digital disruption if their demands are not met. These incidents highlight the continued threat of data extortion attacks against high-profile consumer brands.

Threat Overview

Shinyhunters is a known threat actor with a history of data breaches and extortion, although their recent activity has been less frequent. These new claims suggest a resurgence of the group or an actor using their name. The attacks appear to be financially motivated, following the double extortion model where data is exfiltrated before any potential encryption.

  • Attack on Aman Resorts: The group claims to have targeted Aman Resorts' Salesforce environment, a common repository for sensitive customer data, including Personally Identifiable Information (PII). The exfiltration of 500,000 records, if true, represents a major breach of customer privacy for the high-end hotel chain.
  • Attack on Zara: The claimed compromise of Zara's Google BigQuery data warehouse suggests a breach of a critical data analytics and business intelligence system. Shinyhunters implicates a third-party platform, Anodot.com, as the entry point, pointing towards a potential supply chain vector or a vulnerability in an integrated service.

The group's TTPs in this case are centered on data theft (T1530 - Data from Cloud Storage Object) and public extortion via a leak site, a hallmark of many ransomware and data extortion gangs.

Technical Analysis

While specific technical details of the intrusions are not available, the claims allow for some analysis based on the targeted platforms.

  • Salesforce Compromise (Aman Resorts): Access to a Salesforce instance could be achieved through several methods, including:
    • Phishing for employee credentials (T1566 - Phishing).
    • Exploiting misconfigured permissions or public-facing Salesforce sites.
    • Using stolen session cookies or tokens (T1539 - Steal Web Session Cookie).
    • Compromise of a connected third-party application with excessive permissions.
  • BigQuery Compromise (Zara): Access to Google BigQuery would likely require compromised Google Cloud Platform (GCP) credentials. The attackers' claim implicating Anodot.com suggests they may have exploited a vulnerability in that platform to steal service account keys or user credentials that had access to Zara's BigQuery datasets (T1078.004 - Valid Accounts: Cloud Accounts).

The overall strategy is Data from Information Repositories (T1213) followed by Data Exfiltration over C2 Channel (T1041).

Impact Assessment

If the claims are substantiated, the impact on both companies would be severe.

  • Aman Resorts: The theft of 500,000 PII records from a luxury brand that caters to a wealthy clientele could lead to significant reputational damage, regulatory fines under GDPR and other privacy laws, and potential targeted attacks against its customers.
  • Zara: The compromise of a BigQuery data warehouse could expose sensitive business intelligence, sales data, customer analytics, and internal corporate information. This could impact competitive advantage and strategic planning.
  • For both companies: The public nature of the extortion demand creates immediate brand damage and pressure from customers and regulators. The incidents will necessitate costly forensic investigations, legal counsel, and potential credit monitoring services for affected individuals.

IOCs

No specific IOCs were provided in the source articles.

Detection & Response

Detection Strategies:

  1. Cloud Security Posture Management (CSPM): For the BigQuery incident, a CSPM tool could have detected misconfigurations, public-facing datasets, or overly permissive IAM roles associated with service accounts like the one potentially used by Anodot.com.
  2. SaaS Security Monitoring: For the Salesforce incident, organizations need tools that monitor for anomalous activity within SaaS platforms, such as mass data exports, unusual user login locations, or permission escalations. This is a form of Cloud Activity Log Analysis.
  3. Data Loss Prevention (DLP): Monitoring for large-scale data exfiltration from cloud environments. DLP solutions can be configured to alert when a volume of data exceeding a certain threshold is moved out of the corporate cloud environment. This is related to User Data Transfer Analysis (D3-UDTA).

Response Actions:

  • Both companies should immediately launch an internal investigation, with the help of third-party experts, to validate the attackers' claims.
  • If claims are credible, identify and contain the access vector, revoking compromised credentials and severing malicious connections.
  • Notify relevant data protection authorities and law enforcement as required by law.
  • Prepare for public communication and customer notification.

Mitigation

  • Multi-Factor Authentication (MFA): Enforce MFA on all accounts, especially for critical cloud and SaaS platforms like Salesforce and Google Cloud Platform (M1032 - Multi-factor Authentication).
  • Third-Party Application Auditing: Regularly audit all third-party applications connected to core systems (like Salesforce AppExchange apps or services with GCP access). Ensure they operate under the principle of least privilege (M1054 - Software Configuration).
  • Cloud IAM Best Practices: Implement strict Identity and Access Management (IAM) policies in cloud environments. Avoid using long-lived static credentials and favor short-lived tokens and service accounts with narrowly scoped permissions.
  • Data Classification and Encryption: Classify data based on sensitivity and ensure that the most critical information is encrypted at rest and in transit, with tightly controlled access policies (M1041 - Encrypt Sensitive Information).

Timeline of Events

1
April 18, 2026
Estimated date of the attacks on Aman Resorts and Zara, according to Shinyhunters' claim.
2
April 19, 2026
Shinyhunters posts claims of the breaches on their leak site.
3
April 19, 2026
This article was published
4
April 21, 2026
Deadline set by Shinyhunters for the companies to make contact.

MITRE ATT&CK Mitigations

Enforce MFA on all cloud and SaaS platforms, especially for administrative accounts and those with access to sensitive data repositories like Salesforce and GCP.

Mapped D3FEND Techniques:

Restrict access to sensitive data stores like BigQuery datasets to a limited set of internal IP addresses or through a VPN, reducing exposure from compromised third-party services.

Mapped D3FEND Techniques:

Audit

M1047enterprise

Implement continuous auditing of cloud and SaaS logs to detect anomalous activities such as mass data exports or unusual API access patterns.

Mapped D3FEND Techniques:

Regularly review the permissions of third-party applications integrated with platforms like Salesforce and GCP, ensuring they adhere to the principle of least privilege.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To defend against attacks targeting cloud data stores like Salesforce and BigQuery, organizations must implement robust Cloud Activity and Security Analysis. This involves centralizing and analyzing logs from all SaaS and IaaS platforms. For the Zara incident, this would mean ingesting Google Cloud Audit Logs into a SIEM and creating alerts for anomalous BigQuery activity. For example, an alert should trigger if a service account associated with a third-party like Anodot suddenly queries an unusually large number of tables or exfiltrates data at a high rate. Similarly, for the Aman Resorts breach, Salesforce Event Monitoring logs should be analyzed for indicators like a single user account exporting an abnormally high number of reports or accessing records outside of normal business hours. By establishing a baseline of normal cloud activity, security teams can detect the subtle indicators of a data theft operation in progress and respond before millions of records are lost.

The most fundamental defense against the account takeover that likely preceded these data thefts is the universal enforcement of Multi-factor Authentication (MFA). Both Aman Resorts and Zara should ensure that every single user and service account with access to their Salesforce and Google Cloud environments is protected by MFA. This is not just for human users; modern identity platforms allow for MFA enforcement on service-to-service communication where applicable. Relying on just a username and password for systems containing millions of sensitive records is negligent. Implementing phishing-resistant MFA, such as FIDO2 security keys, provides the strongest protection against credential theft. Even if an attacker manages to steal a user's password, they would be unable to access the cloud platforms without the physical second factor, effectively stopping the attack chain at the initial access stage.

User Data Transfer Analysis is a specific detection technique crucial for catching data exfiltration in progress. Security teams at companies like Zara and Aman Resorts should deploy tools that monitor the volume and flow of data leaving their cloud environments. For the Salesforce breach, this would involve setting thresholds for the number of records exported by a single user in a given timeframe. An alert would be generated if a user who normally exports 100 records per day suddenly exports 500,000. For the BigQuery breach, this would involve monitoring the egress data volume from the project. A sudden spike in data transfer from BigQuery to an external IP, especially one not on an allowlist, would be a strong indicator of theft. This technique moves beyond simple access logging to quantify data movement, providing a high-fidelity signal that a data breach is actively occurring.

Sources & References

Victim: Aman Resorts (aman.com)
Ransomware.live (ransomware.live) April 19, 2026
Victim: Zara (zara.com)
Ransomware.live (ransomware.live) April 19, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

ShinyhuntersRansomwareData BreachSalesforceBigQueryExtortion

📢 Share This Article

Help others stay informed about cybersecurity threats