HomeIntelligenceBrief
BREACH BRIEF🟠 High Breach

Zara Data Breach Exposes 197,000 Customer Emails and Purchase Histories via Former Tech Provider Compromise

Hackers accessed databases hosted by a former technology provider for Zara, stealing over 197 k unique email addresses, geographic locations, order IDs and support‑ticket details. The breach, claimed by the ShinyHunters gang, highlights third‑party supply‑chain risk for retail brands.

LiveThreat™ Intelligence · 📅 May 08, 2026· 📰 bleepingcomputer.com
🟠
Severity
High
BR
Type
Breach
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
3 recommended
📰
Source
bleepingcomputer.com

Zara Data Breach Exposes 197,000 Customer Emails and Purchase Histories via Former Tech Provider Compromise

What Happened – Hackers accessed databases formerly hosted by a third‑party technology provider for Zara, extracting more than 197 k unique customer email addresses, geographic locations, order IDs and support‑ticket details. The breach was publicly claimed by the ShinyHunters extortion gang, which also released a 140 GB archive of the stolen data.

Why It Matters for TPRM

  • Third‑party hosting failures can leak large volumes of consumer data even when core systems remain untouched.
  • Exposure of purchase histories and email addresses enables credential‑stuffing, phishing, and targeted fraud campaigns against both customers and supply‑chain partners.
  • Lack of attribution and limited visibility into the provider’s security posture heightens supply‑chain risk for all Inditex brands.

Who Is Affected – Retail & e‑commerce (Zara, Inditex group), their franchised stores, and any downstream vendors that process customer orders or support tickets.

Recommended Actions

  • Review contracts and security clauses with former and current technology providers; demand evidence of encryption at rest and strict access controls.
  • Verify that any shared authentication tokens (e.g., Anodot, SSO credentials) have been rotated and that MFA is enforced.
  • Conduct a data‑subject impact assessment and notify affected customers per GDPR/CCPA requirements.

Technical Notes – Attack vector appears to be a compromise of a former cloud‑hosting provider’s credentials (Anodot authentication tokens) leading to unauthorized BigQuery queries. No CVEs were disclosed. Stolen data includes email addresses, market‑specific SKUs, order IDs and support‑ticket metadata; no names, phone numbers, addresses, or payment details were reported. Source: BleepingComputer

📰 Original Source
https://www.bleepingcomputer.com/news/security/zara-data-breach-exposed-personal-information-of-197-000-people/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.