Dutch Telecom Odido Breach Exposes 6.2 Million Customers
Odido confirms cyberattack exposed names, IBANs, passport numbers, and personal data of 6.2 million Dutch customers. Services remain operational.
Odido, one of the Netherlands' largest telecommunications providers, disclosed a breach affecting 6.2 million customers—nearly a third of the country's population. The company detected unauthorized access on February 7 and confirmed this week that attackers accessed names, phone numbers, email addresses, dates of birth, postal addresses, bank account numbers (IBANs), and government-issued ID details including passport and driver's license numbers.
The breach ranks among the largest in Dutch history. BleepingComputer reports that Odido has begun emailing affected customers, with notifications expected to reach everyone within 48 hours.
What Was Stolen
The exposed data is particularly sensitive for identity theft and fraud:
- Full names and contact details
- Dates of birth
- Bank account numbers (IBANs)
- Government ID numbers (passport, driver's license)
- ID validity dates
Critically, the breach did not include passwords, call records, or invoice data. But the combination of IBAN and government ID information is potent—exactly what fraudsters need for bank account takeovers or identity impersonation.
NL Times quoted cybersecurity experts calling the data "worth gold" on criminal marketplaces. Unlike passwords (which can be changed) or payment cards (which can be canceled), passport numbers and IBANs are persistent identifiers that victims can't easily replace.
How It Happened
Odido hasn't disclosed technical details about the intrusion vector. The company terminated unauthorized access "as quickly as possible" after detection and brought in external cybersecurity firms to assist with investigation and remediation.
The telecom sector has become a high-value target for both ransomware operators and nation-state actors. We covered Singapore's massive UNC3886 telecom breach just yesterday—a reminder that telcos manage infrastructure critical to both consumer privacy and national security.
Services Unaffected
Despite the breach scope, Odido's operational services remained online throughout the incident. Customers can continue making calls, using internet services, and watching TV without disruption. This distinction matters because some telecom attacks—like the BridgePay ransomware incident we covered last week—resulted in extended service outages.
Regulatory and Customer Response
Odido reported the incident to the Dutch Data Protection Authority (Autoriteit Persoonsgegevens), as required under GDPR. The authority can levy fines up to €20 million or 4% of annual revenue for inadequate data protection practices.
Affected customers should:
- Monitor bank accounts for unauthorized transactions
- Be vigilant for phishing attempts using the leaked personal details
- Consider placing fraud alerts with Dutch credit bureaus
- Verify any communications claiming to be from Odido before clicking links
The personalized nature of the stolen data means phishing campaigns can be highly convincing. Attackers now know customer names, phone numbers, and potentially which bank they use—enough context to craft believable pretexts.
Why This Matters
The Netherlands has a relatively small population of 18 million. Exposing 6.2 million records means this breach potentially affects one-third of Dutch residents. That concentration creates systemic risk—a significant portion of the country's population now faces elevated fraud risk from a single incident.
For organizations handling similar volumes of sensitive personal data, the incident underscores a recurring theme: perimeter security alone isn't sufficient. Detection capabilities, data minimization practices, and incident response planning determine whether a breach becomes a contained incident or a national-scale exposure. Our guide on data breach fundamentals covers the basics for organizations building their response capabilities.
Related Articles
UK Regulator Hits LastPass with £1.2 Million Fine Over 2022 Breach
ICO penalty cites inadequate security measures that enabled hackers to steal data of 1.6 million UK users. Cryptocurrency theft linked to breach exceeds $438 million.
Dec 27, 2025PayPal Breach Exposed SSNs for Six Months Before Detection
A coding error in PayPal Working Capital exposed customer SSNs and business data since July 2025. Unauthorized transactions detected on some affected accounts.
Feb 24, 2026ShinyHunters Demands $1.5M From Wynn Resorts Over Stolen Data
ShinyHunters claims 800,000+ Wynn Resorts employee records including SSNs, salaries, and personal details. Group demands 22 Bitcoin by February 23, exploited Oracle PeopleSoft.
Feb 23, 2026Australian Court Files Exposed via Third-Party Offshoring Breach
VIQ Solutions confirms sensitive Australian court data including domestic violence and national security cases accessed by unauthorized Indian subcontractor e24 Technologies.
Feb 23, 2026