PROBABLYPWNED
Data BreachesMay 12, 20265 min read

Zara Breach Exposes 197K Customers via Third-Party Analytics Provider

ShinyHunters leaked 140GB of Zara customer data stolen through compromised Anodot authentication tokens. The breach exposed email addresses, order history, and support tickets from Snowflake and BigQuery integrations.

Sarah Mitchell

ShinyHunters has leaked 140GB of Zara customer data, exposing personal information belonging to more than 197,000 people. The breach originated from a compromised third-party analytics provider, with attackers using stolen Anodot authentication tokens to access data stored in Snowflake and BigQuery instances.

Spanish fashion giant Inditex, Zara's parent company, confirmed the incident but has not publicly identified the breached vendor. The attack continues ShinyHunters' prolific 2026 campaign, which includes the massive Canvas educational breach affecting 275 million records.

TL;DR

  • What happened: Attackers compromised third-party analytics provider to access Zara customer data
  • Who's affected: 197,400 Zara customers globally
  • What was exposed: Email addresses, order IDs, purchase history, support tickets, geographic location
  • What was NOT exposed: Names, passwords, payment details, addresses, phone numbers

How the Breach Occurred

According to BleepingComputer, ShinyHunters gained access through integrations between Anodot—a business analytics platform—and cloud data warehouses. The attack chain:

  1. Compromised Anodot authentication tokens
  2. Used tokens to access connected Snowflake and BigQuery instances
  3. Exfiltrated customer data from Zara's analytics pipelines
  4. Published 140GB archive on their leak site

The breach didn't target Zara's core systems directly. Instead, attackers exploited the trust relationship between Zara's infrastructure and a third-party service—a pattern increasingly common in modern breaches. Organizations relying on SaaS integrations should review our data breach prevention guidance for defensive strategies.

What Data Was Exposed

Have I Been Pwned analyzed the leaked data and confirmed 197,400 unique email addresses. The exposed information included:

Data TypeExposed
Email addressesYes
Order IDsYes
Product SKUsYes
Purchase historyYes
Support ticket contentYes
Geographic marketYes
NamesNo
PasswordsNo
Payment/banking infoNo
AddressesNo
Phone numbersNo

The absence of credentials and payment data limits the immediate fraud risk. However, exposed purchase history and support communications could enable targeted phishing. Attackers knowing what someone bought, when, and what issues they reported can craft convincing social engineering campaigns.

Inditex Response

Inditex confirmed the breach affected a former technology provider:

"Inditex has immediately applied its security protocols and has started notifying the relevant authorities."

The company emphasized that its own operations and systems remained unaffected. However, Inditex has not disclosed:

  • The identity of the compromised provider
  • How long attackers had access
  • Whether other Inditex brands (Massimo Dutti, Pull&Bear, Bershka) were affected
  • Specific timeline of breach discovery and containment

ShinyHunters: A Prolific Threat Actor

ShinyHunters has been exceptionally active in 2026. Beyond Zara, the group has claimed responsibility for breaches at:

  • Canvas/Instructure: 275 million student and teacher records
  • NVIDIA GeForce NOW: Armenian user database leaked on May 10
  • ADT: 5.5 million customer records via Salesforce compromise
  • Google, Cisco, Match Group: Various 2026 incidents

The group's tactics consistently exploit third-party access rather than directly attacking target organizations. They've demonstrated particular skill at abusing SSO credentials and cloud service integrations—the same connective tissue that enables modern enterprise architecture.

Third-Party Risk Reality

The Zara breach illustrates a fundamental challenge: organizations can't fully control their security perimeter when critical functions depend on external providers.

Anodot integrations require broad data access to perform analytics. When those credentials are compromised, attackers gain the same access legitimate analytics need—visibility into customer behavior, transaction patterns, and support interactions.

This isn't a unique failure. The same pattern appeared in the Snowflake-related breaches of 2024-2025, where compromised credentials at third-party service providers cascaded into major incidents at enterprise customers.

Protection Recommendations

For affected customers:

  • Monitor for phishing attempts referencing past Zara purchases
  • Be skeptical of support communications you didn't initiate
  • Check haveibeenpwned.com to confirm if your email appears in the breach

For organizations:

  • Audit third-party integrations and their access scope
  • Implement least-privilege for analytics connections
  • Require MFA for all service account access
  • Monitor for unusual query patterns in data warehouses

Why This Matters

Third-party breaches are the new normal. Organizations invest heavily in perimeter security, endpoint protection, and employee training—then grant analytics providers broad access to customer data because that's what the integration requires.

The Zara incident reinforces that vendor security is enterprise security. An organization's breach exposure includes not just their own systems, but every partner, contractor, and SaaS platform with access to sensitive data.

ShinyHunters' success at this specific attack vector suggests they'll continue exploiting it. Expect more third-party-originating breaches throughout 2026.

Frequently Asked Questions

How do I know if I'm affected? Check haveibeenpwned.com with your email address. If you've made Zara purchases or contacted their support, your information may be in the leaked dataset.

Should I change my Zara password? Passwords weren't exposed in this breach. However, changing passwords is always good hygiene, especially if you reuse credentials across sites.

Will I be notified by Zara? Inditex stated they're notifying relevant authorities. GDPR requires notification of affected individuals within 72 hours of discovering a breach involving personal data. However, company communication timelines vary.

Related Articles