Zara Breach Exposes 197K Customers via Third-Party Analytics Provider
ShinyHunters leaked 140GB of Zara customer data stolen through compromised Anodot authentication tokens. The breach exposed email addresses, order history, and support tickets from Snowflake and BigQuery integrations.
ShinyHunters has leaked 140GB of Zara customer data, exposing personal information belonging to more than 197,000 people. The breach originated from a compromised third-party analytics provider, with attackers using stolen Anodot authentication tokens to access data stored in Snowflake and BigQuery instances.
Spanish fashion giant Inditex, Zara's parent company, confirmed the incident but has not publicly identified the breached vendor. The attack continues ShinyHunters' prolific 2026 campaign, which includes the massive Canvas educational breach affecting 275 million records.
TL;DR
- What happened: Attackers compromised third-party analytics provider to access Zara customer data
- Who's affected: 197,400 Zara customers globally
- What was exposed: Email addresses, order IDs, purchase history, support tickets, geographic location
- What was NOT exposed: Names, passwords, payment details, addresses, phone numbers
How the Breach Occurred
According to BleepingComputer, ShinyHunters gained access through integrations between Anodot—a business analytics platform—and cloud data warehouses. The attack chain:
- Compromised Anodot authentication tokens
- Used tokens to access connected Snowflake and BigQuery instances
- Exfiltrated customer data from Zara's analytics pipelines
- Published 140GB archive on their leak site
The breach didn't target Zara's core systems directly. Instead, attackers exploited the trust relationship between Zara's infrastructure and a third-party service—a pattern increasingly common in modern breaches. Organizations relying on SaaS integrations should review our data breach prevention guidance for defensive strategies.
What Data Was Exposed
Have I Been Pwned analyzed the leaked data and confirmed 197,400 unique email addresses. The exposed information included:
| Data Type | Exposed |
|---|---|
| Email addresses | Yes |
| Order IDs | Yes |
| Product SKUs | Yes |
| Purchase history | Yes |
| Support ticket content | Yes |
| Geographic market | Yes |
| Names | No |
| Passwords | No |
| Payment/banking info | No |
| Addresses | No |
| Phone numbers | No |
The absence of credentials and payment data limits the immediate fraud risk. However, exposed purchase history and support communications could enable targeted phishing. Attackers knowing what someone bought, when, and what issues they reported can craft convincing social engineering campaigns.
Inditex Response
Inditex confirmed the breach affected a former technology provider:
"Inditex has immediately applied its security protocols and has started notifying the relevant authorities."
The company emphasized that its own operations and systems remained unaffected. However, Inditex has not disclosed:
- The identity of the compromised provider
- How long attackers had access
- Whether other Inditex brands (Massimo Dutti, Pull&Bear, Bershka) were affected
- Specific timeline of breach discovery and containment
ShinyHunters: A Prolific Threat Actor
ShinyHunters has been exceptionally active in 2026. Beyond Zara, the group has claimed responsibility for breaches at:
- Canvas/Instructure: 275 million student and teacher records
- NVIDIA GeForce NOW: Armenian user database leaked on May 10
- ADT: 5.5 million customer records via Salesforce compromise
- Google, Cisco, Match Group: Various 2026 incidents
The group's tactics consistently exploit third-party access rather than directly attacking target organizations. They've demonstrated particular skill at abusing SSO credentials and cloud service integrations—the same connective tissue that enables modern enterprise architecture.
Third-Party Risk Reality
The Zara breach illustrates a fundamental challenge: organizations can't fully control their security perimeter when critical functions depend on external providers.
Anodot integrations require broad data access to perform analytics. When those credentials are compromised, attackers gain the same access legitimate analytics need—visibility into customer behavior, transaction patterns, and support interactions.
This isn't a unique failure. The same pattern appeared in the Snowflake-related breaches of 2024-2025, where compromised credentials at third-party service providers cascaded into major incidents at enterprise customers.
Protection Recommendations
For affected customers:
- Monitor for phishing attempts referencing past Zara purchases
- Be skeptical of support communications you didn't initiate
- Check haveibeenpwned.com to confirm if your email appears in the breach
For organizations:
- Audit third-party integrations and their access scope
- Implement least-privilege for analytics connections
- Require MFA for all service account access
- Monitor for unusual query patterns in data warehouses
Why This Matters
Third-party breaches are the new normal. Organizations invest heavily in perimeter security, endpoint protection, and employee training—then grant analytics providers broad access to customer data because that's what the integration requires.
The Zara incident reinforces that vendor security is enterprise security. An organization's breach exposure includes not just their own systems, but every partner, contractor, and SaaS platform with access to sensitive data.
ShinyHunters' success at this specific attack vector suggests they'll continue exploiting it. Expect more third-party-originating breaches throughout 2026.
Frequently Asked Questions
How do I know if I'm affected? Check haveibeenpwned.com with your email address. If you've made Zara purchases or contacted their support, your information may be in the leaked dataset.
Should I change my Zara password? Passwords weren't exposed in this breach. However, changing passwords is always good hygiene, especially if you reuse credentials across sites.
Will I be notified by Zara? Inditex stated they're notifying relevant authorities. GDPR requires notification of affected individuals within 72 hours of discovering a breach involving personal data. However, company communication timelines vary.
Related Articles
ShinyHunters Breaches Rockstar Games via Anodot Token Theft
GTA 6 developer Rockstar Games confirms third-party breach after ShinyHunters stole Snowflake credentials through Anodot. Ransom deadline set for April 14.
Apr 12, 2026ShinyHunters Breach Anodot, Steal Data From Snowflake Customers
ShinyHunters compromised SaaS analytics provider Anodot, using stolen authentication tokens to access and exfiltrate data from dozens of Snowflake customers.
Apr 10, 2026NVIDIA Confirms GeForce NOW Partner Breach Affecting Armenian Users
Armenian GeForce NOW operator GFN.AM suffered a data breach exposing user emails, names, and phone numbers. NVIDIA clarifies its own infrastructure wasn't compromised. ShinyHunters claims credit.
May 10, 2026ADT Breach Exposes 5.5 Million Customers After Vishing Attack
ShinyHunters breached home security giant ADT via voice phishing to compromise an employee's Okta SSO, stealing 5.5 million customer records from Salesforce.
May 2, 2026