On the weekend of February 7 and 8, 2026, someone walked through an open door at Odido. Not a back door. Not a zero-day exploit that required months of engineering. A door that was left open because the basics were not done well enough. By the time the alarm was raised, the personal data of millions of customers, including names, home addresses, bank account numbers, passport numbers and dates of birth, had already left the building.

This piece is not primarily about Odido. It is about what Odido represents: a pattern playing out across corporate Europe at speed, and a question every organisation handling sensitive customer data should be asking itself right now. Not "are we compliant?" but "are we genuinely prepared?"

Status as of February 24, 2026: ShinyHunters has issued a "final warning" to Odido on their dark web platform, demanding a seven-figure ransom. Deadline: Thursday morning, February 26. The data has not yet been publicly released. The extortion phase is active.

What Actually Happened

Employee at computer unaware of shadow figure behind — social engineering threat

The attacker does not need to break in. They just need someone inside to let them in.

Odido confirmed that attackers gained access to a customer contact system, described in independent reporting as a Salesforce CRM environment. The entry method was social engineering, a combination of phishing and credential manipulation targeting employees, not a technical vulnerability in Odido's core infrastructure. Once inside, the attackers exfiltrated data quietly, over a period of time, before anyone noticed.

The data confirmed stolen includes full names, addresses, mobile numbers, customer numbers, email addresses, IBANs, dates of birth, and identification document numbers with validity dates. Odido states this affected approximately 6.2 million customers across Odido NL and its sub-brand BEN.nl.

ShinyHunters disputes this figure. In direct communication with RTL Nieuws journalist Daniël Verlaan, the group stated: "Odido is lying. It concerns 8 million customers and a total of 21 million rows of data." That discrepancy, roughly 2 million additional customers and 15 million additional records, has never been addressed by Odido.

Confirmed vs. Claimed — Side by Side

Customers affectedOdido: 6.2M / ShinyHunters: 8M
Total records21M claimed, gap unexplained
IBANs, addresses, ID numbersConfirmed by Odido
Login passwords (Mijn Odido)Not leaked, confirmed
Verification code words (password_c)Leaked, stored plaintext in CRM
Internal documents, source codeClaimed, not confirmed or denied
Data publicly releasedNot yet, as of Feb 24
Attacker named by OdidoNo official confirmation

The Password That Was Not a Password

password_c field cracked neon display with broken padlocks and warning signs

The field was called password_c. It was not a login password. It was something arguably more dangerous in this context.

ShinyHunters claimed to hold plaintext customer passwords. Odido flatly denied this, stating that "no passwords from Mijn Odido or other login systems have been leaked." Both statements are technically defensible. Neither tells the complete story.

What was actually leaked is a field in the Salesforce CRM named password_c. This is not a login password. It is a spoken verification code word, agreed between a customer and Odido for use when calling customer service to authorise account changes, the kind of thing a customer might use to verify their identity over the phone before changing a direct debit or updating an address.

Odido clarified this quietly, buried in the FAQ section of their official incident page, only after the "plaintext passwords" framing had already dominated media coverage for days. The correction is accurate. The timing of the clarification is worth noting.

"Despite its name, this is not a password, but a so-called challenge word or code word. This was used as an additional security question when a customer contacted us by telephone."

Odido official statement, odido.nl/veiligheid-eng, updated February 23, 2026

The problem is not that Odido stored this field. The problem is that they stored it in plaintext. A spoken verification code, linked to a customer's name, address, IBAN and passport number, sitting in a CRM environment reachable via a phishing call. That is a security hygiene failure, regardless of what the field is called.

This Was Not Sophisticated. That Is the Point.

Salesforce CRM screens fractured by lightning — data breach through CRM access

Salesforce was not the vulnerability. The access controls around it were.

When a major breach makes headlines, the instinct is to frame it as the work of elite nation-state actors using complex tools. It flatters the victim and satisfies the reader's appetite for drama. The reality here is considerably less glamorous, and considerably more alarming.

ShinyHunters did not crack Odido's encryption. They did not exploit a previously unknown vulnerability in network infrastructure. According to reporting by NOS, they used a combination of phishing and social engineering to gain access to a Salesforce environment, then downloaded data quietly before anyone noticed.

This playbook is not new and it is not unique to Odido. As investigative journalist Brian Krebs documented in October 2025, ShinyHunters launched an identical Salesforce campaign in May 2025, using voice phishing to trick employees at dozens of companies into connecting a malicious application to their organisation's Salesforce portal. The victims included Toyota, FedEx, Disney and UPS. Google's own Threat Intelligence Group, which tracks the group as UNC6040, confirmed the methodology. And notably, Google itself acknowledged that one of its own corporate Salesforce instances was compromised in the same campaign.

Security community term for ShinyHunters and affiliated groups
Advanced Persistent Teenagers
APT. The acronym that usually denotes sophisticated nation-state threat actors.
In this case, it means something rather different.
Term coined by security researcher Kevin Beaumont, October 2025. The irony is entirely intentional.

If Google, with its security resources and expertise, was caught in this net, the implication for the average Dutch enterprise is sobering. The sophistication barrier to this kind of attack is not high. What it requires is not elite skill. It requires a target that has left the door open.

The Law Is Not the Point

NIS2, the European Union's updated Network and Information Security directive, was supposed to be transposed into Dutch national law by January 1, 2025. It has not been. The Netherlands is formally in breach of EU rules on this point, and the Cyberbeveiligingswet, the Dutch implementation law, is not expected to take effect until Q2 2026.

Some have used this delay to suggest Odido's compliance obligations were not fully in force at the time of the breach. The argument goes: if the law is not law yet, the obligation does not fully apply.

This argument misses the point entirely.

Odido is a telecommunications provider handling the financial and identity data of more than six million people. They operated under the older Wbni framework, which already imposed meaningful security obligations on critical infrastructure operators. More fundamentally, the ethical obligation to protect customer data does not originate in a piece of legislation. It originates in the decision to accept that data in the first place.

The law is a floor, not a ceiling. The obligation to protect customer data does not begin when the legislation takes effect. It begins when you ask for the data.

ShinyHunters Is Not Finished

ShinyHunters network map showing Odido, Harvard, Panera Bread, SoundCloud and other victims connected to central demon face

ShinyHunters at the centre. Odido, Harvard, Panera Bread, SoundCloud: the list keeps growing.

Understanding the Odido breach in isolation misses the larger picture. ShinyHunters is running an active, systematic campaign against organisations across Europe and North America using a consistent and documented playbook: identify companies using cloud CRM platforms, gain access via voice phishing, exfiltrate data quietly, apply extortion pressure through their dark web platform. Repeat.

When Salesforce itself was targeted as an intermediary in October 2025, ShinyHunters demanded Salesforce pay a single ransom covering all victims, stating that if Salesforce paid, all individual extortions would be withdrawn. Salesforce refused publicly, stating it would not engage with, negotiate with, or pay any extortion demand. Odido now faces the same choice individually.

ShinyHunters Confirmed Victims, 2025 to February 2026 — Partial List

Odido NL / BEN.nlFeb 2026 — NL
Harvard UniversityJan 2026 — US
University of PennsylvaniaJan 2026 — US
Panera BreadJan 2026 — US
Match GroupJan 2026 — US
SoundCloudJan/Feb 2026
Canada GooseJan/Feb 2026
Toyota Motor Corporation2025 — Salesforce campaign
FedEx2025 — Salesforce campaign
Disney / Hulu2025 — Salesforce campaign
Google (internal instance)2025 — confirmed by Google
DiscordSep 2025
Red HatOct 2025 — 28,000 Git repositories

The ShinyHunters Oven Is On. Who Is Next?

That is not a rhetorical question. It is a practical one. The attack vector being used here, social engineering into cloud CRM platforms, is not Odido-specific. It is sector-agnostic. Any organisation running customer data through a cloud-based CRM environment, which covers the overwhelming majority of medium and large enterprises across the Netherlands and Europe, is operating in the same threat landscape that Odido was in when this breach occurred.

The question every board, every CTO, every data protection officer should be sitting with today is not "could we be attacked?" The answer to that is yes, for nearly everyone. The question is: if ShinyHunters pointed their playbook at us tomorrow morning, what would they find?

Would they find multi-factor authentication enforced across all CRM access? Least-privilege controls limiting which employees can reach which customer data fields? Regular voice phishing simulation training with documented outcomes? A data minimisation policy that asks whether plaintext storage of verification codes in a customer-facing system is actually necessary? An incident response plan that has been tested, not just written and filed?

If the honest answer to any of those questions is "we are not sure," that is where the work starts. Not when the dark web post appears. Not when a journalist calls for comment. Now.

Odido's customers extended trust. Millions of them are now monitoring their bank accounts for unusual transactions, checking whether their passport details are being used to open fraudulent credit lines, and fielding suspicious calls from people claiming to be their bank. That is the real cost of complacency. It does not show up in a compliance audit. It shows up in the lives of the people whose data you were holding.

Legenda

Not familiar with the terminology? Here is what the key terms in this article mean, with links to further reading where available.

NIS2 — Network and Information Security Directive 2
The EU's updated cybersecurity law requiring organisations in critical sectors to implement strong security measures and report incidents promptly. Was supposed to become Dutch national law by January 1, 2025. Still pending as of Q1 2026. EU official page →
Wbni — Wet beveiliging netwerk- en informatiesystemen
The Dutch national implementation of the original NIS directive, currently the applicable law for critical infrastructure operators including telecoms providers such as Odido. Dutch government page →
Salesforce CRM
A cloud-based customer relationship management platform widely used by large enterprises to store customer data. In Odido's case, this was the environment from which the password_c verification field was exfiltrated. Salesforce itself was separately targeted by ShinyHunters in 2025.
Social Engineering / Voice Phishing (Vishing)
Manipulation of people rather than systems to gain unauthorised access. Voice phishing means calling employees, impersonating trusted parties, to obtain credentials or convince staff to connect malicious applications to corporate systems. No sophisticated hacking required.
Plaintext Storage
Storing sensitive data in readable, unencrypted form. If accessed by an attacker, its contents are immediately readable with no additional effort. Industry best practice requires all credential and verification data to be stored in encrypted or hashed form.
ShinyHunters (UNC6040)
A cybercriminal extortion group tracked by Google's Threat Intelligence Group as UNC6040. Known for breaching cloud CRM environments via voice phishing since at least 2024. Krebs on Security →
ISO 27001
The international standard for information security management systems. ISO official page →
Data Minimisation
A principle under GDPR and NIS2 requiring organisations to collect and retain only the personal data strictly necessary for a defined purpose.
Least-Privilege Access
A security principle under which each employee or system component is granted only the minimum level of access needed to perform their function.
GDPR — General Data Protection Regulation
The EU's data protection law, in force since 2018. Requires organisations to protect personal data and report breaches to the national authority within 72 hours. gdpr.eu →
Autoriteit Persoonsgegevens (AP)
The Dutch Data Protection Authority, responsible for enforcing GDPR in the Netherlands. Odido reported this incident to the AP as legally required. AP website →

Sources & Further Reading

  1. Odido official incident page (updated Feb 23, 2026): odido.nl/veiligheid-eng
  2. RTL Nieuws, Daniël Verlaan (Feb 23, 2026): rtl.nl
  3. Brian Krebs / KrebsOnSecurity, "ShinyHunters Wage Broad Corporate Extortion Spree" (Oct 7, 2025): krebsonsecurity.com
  4. Google Threat Intelligence Group (GTIG): ShinyHunters tracked as UNC6040, Salesforce campaign (June 2025)
  5. NOS reporting on Salesforce attack vector, Odido breach (February 2026)
  6. Dutch Cyberbeveiligingswet implementation status: Rijksoverheid.nl
  7. Kevin Beaumont, "Advanced Persistent Teenagers" — Mastodon post, October 2025

Are You an Odido or BEN.nl Customer?

Check your personal status on Odido's official incident page. Be alert to phishing calls, unexpected invoices, and messages claiming to be from your bank or Odido.

Check Your Status → Follow ETH on X →