ShinyHunters Threatens 21M Odido Records Leak Including Plaintext Passwords and Passports


ShinyHunters claims breach of 21 million records from 8 million Odido/BEN NL telecom customers. Dark web post demands low seven-figure ransom by February 26, 2026, or full dump publishes. Alleged data spans plaintext passwords, IBANs, passports, driver licenses, corporate source code.

Odido confirmed February 7-8, 2026 breach hit Salesforce customer contact system. Company disclosed 6.2 million affected with names, addresses, phones, emails, bank details, ID numbers. Core telecom services stayed operational throughout incident.

ShinyHunters disputes scope calling Odido disclosure inaccurate. Hackers claim 21M total records versus 6.2M admitted. “Final warning” message threatens additional “digital problems” beyond data leak.

Plaintext password field labeled “password_c” actually contains phone verification challenge words. Odido discontinued practice post-incident. National insurance numbers never stored in affected systems.

Phishing emails targeted customer service staff for Salesforce credentials. ShinyHunters specializes in social engineering against cloud environments. Previous Salesforce customer extortion campaign established pattern.

Exposed Data Table

Data TypeRisk LevelImpact
Plaintext passwordsCriticalAccount takeovers
Passport numbersCriticalIdentity theft
Driver’s licensesHighForgery attacks
IBAN bank detailsHighFinancial fraud
Corporate source codeHighInfrastructure vulns
Customer addressesMediumPhysical targeting

8 million customers span current and former accounts. Data retention practices face immediate scrutiny. Telecom sector identity exposure creates mass fraud vectors.

Attack Timeline

Feb 7-8, 2026: Salesforce phishing breach confirmed
Early Feb: Odido discloses 6.2M affected
Feb 24: ShinyHunters posts 21M record claim
Feb 26: Ransom deadline or data publishes

Dutch Banking Association guidance states IBAN changes unnecessary. Account numbers alone insufficient for online banking access without additional auth.

Source code exposure threatens infrastructure vulns. Internal documents enable targeted social engineering against remaining staff.

Immediate Customer Actions

  • Monitor bank statements for unauthorized transactions
  • Enable 2FA across all email/banking immediately
  • Freeze credit reports through Dutch bureaus
  • Watch for phishing referencing Odido breach
  • Change passwords proactively across platforms
  • Request identity monitoring through Odido portal

Regulatory scrutiny inevitable post-leak. GDPR fines loom alongside Dutch authority probes. Telecom sector faces heightened breach disclosure pressure.

ShinyHunters established pattern with tech giants previously. Mass credential stuffing campaigns anticipated post-dump. Dark web monitoring shows active negotiation attempts.

FAQ

How many Odido customers affected per ShinyHunters?

8 million customers, 21 million total records claimed.

Did breach include login passwords?

No. “password_c” field held phone verification words only.

What caused initial Salesforce compromise?

Phishing emails targeting customer service staff credentials.

Ransom deadline set by hackers?

February 26, 2026 or full data publishes publicly.

Core telecom services impacted?

No. Mobile, internet, TV remained operational throughout.

Banking Association IBAN guidance?

No changes needed. Account numbers alone insufficient for access.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages