Netcrook Logo
👤 SECPULSE
🗓️ 24 Feb 2026   🌍 Europe

Inside the Odido Data Leak: Are Millions at Risk After ShinyHunters' Latest Cyber Heist?

Subtitle: A notorious hacker group claims to have exposed sensitive data from 8 million Odido customers, raising urgent questions about transparency and security failures.

When the hacker collective ShinyHunters surfaced this week with a bombshell announcement, the Dutch telecom sector was jolted into crisis mode. The group claims to have breached Odido - formerly known as T-Mobile Netherlands - and its subsidiary BEN, exfiltrating a trove of sensitive information from millions of unsuspecting customers. As the dust settles, the true scale of the breach and the company’s alleged lack of transparency have become the focus of intense scrutiny.

Behind the Breach: What Happened?

ShinyHunters, a cybercriminal syndicate infamous for headline-grabbing data theft and extortion campaigns, claims responsibility for what could be one of the largest data breaches in Dutch telecom history. The group alleges that Odido was “not truthful” in its initial disclosures, hinting at a cover-up or at least a severe underestimation of the breach’s magnitude. If their assertions hold, Odido’s systems were not only compromised - they were laid bare on a historic scale.

According to claims verified by several cybersecurity outlets, the attackers made off with 21 million records, exposing the personal details of around 8 million customers. The stolen data is said to include plaintext passwords (meaning they were not encrypted), passport and driver’s license numbers, International Bank Account Numbers (IBANs), physical and email addresses, as well as internal corporate documents and even proprietary source code. This combination of financial, identification, and operational data spells disaster for both customer safety and corporate stability.

Why Does This Matter?

The presence of plaintext passwords is particularly alarming. Unlike encrypted or hashed passwords, plaintext credentials can be immediately used by criminals to hijack user accounts, launch credential stuffing attacks, and orchestrate targeted phishing campaigns. The exposure of passport numbers and IBANs opens the door to identity theft and large-scale financial fraud, while leaked internal documents and source code could compromise Odido’s future operations and intellectual property.

Regulators are now expected to scrutinize Odido’s security protocols and its handling of breach notifications. For affected customers, the advice is clear: change passwords immediately, monitor financial accounts, and stay alert for suspicious communications. Meanwhile, Odido faces a reckoning - not just with authorities, but with the millions who trusted them to safeguard their information.

The Bigger Picture

This incident is a stark reminder of the stakes in today’s cybersecurity landscape. As companies hold ever more sensitive data, the consequences of a breach grow ever more severe. Transparency, robust security measures, and proactive communication aren’t just best practices - they’re essential for survival in the digital age.

WIKICROOK

  • Plaintext password: A plaintext password is stored or sent without encryption, making it easy for attackers to read and steal. It poses a major security risk.
  • Credential stuffing: Credential stuffing is when attackers use stolen usernames and passwords from one site to try and access accounts on other sites.
  • IBAN (International Bank Account Number): IBAN is a standardized code that uniquely identifies bank accounts internationally, streamlining and securing cross-border financial transactions.
  • Source code: Source code is the original set of instructions written by programmers that tells software or systems how to operate and perform specific tasks.
  • Phishing: Phishing is a cybercrime where attackers send fake messages to trick users into revealing sensitive data or clicking malicious links.
Odido data leak ShinyHunters cybersecurity risks

SECPULSE SECPULSE
SOC Detection Lead
← Back to news