
197,000 People Affected in Zara Data Breach Tied to Analytics Vendor
.webp)
Inditex, the Spanish retail giant behind Zara, has confirmed a data breach that exposed the personal information of 197,000 people. The breach did not originate inside Inditex's own systems. Instead, it traced back to a former third-party technology provider, whose compromise gave attackers access to data across multiple companies operating internationally.
The Zara data breach came to light in mid-April 2026, when Inditex disclosed unauthorized access to databases held by an external contractor. Within days, the extortion group ShinyHunters added Zara to its dark web leak portal and threatened to publish the stolen data unless a ransom was paid.
How the Breach Happened
The entry point was Anodot, an Israeli AI analytics platform. ShinyHunters compromised Anodot's systems and used stolen authentication tokens to access cloud data belonging to Anodot's customers, primarily through Snowflake environments. This gave the attackers legitimate-looking access to downstream company data without exploiting Salesforce or Snowflake directly.
Inditex did not name Anodot in its initial statement, but the company acknowledged that the breach "stems from a security incident that affected a former technology provider and has impacted several companies operating internationally." The ShinyHunters listing for Zara was more specific, stating that "BigQuery instances data was compromised thanks to Anodot.com."
The group claimed to have taken 192 GB of data from Zara's BigQuery instances. That volume points to a significant extraction, even if the nature of the data remains partially disputed.
What Data Was Exposed
Inditex maintained that the compromised databases did not contain customer names, addresses, passwords, or payment card details. The company described the affected data as relating to "commercial relations" rather than personal customer records.
However, the confirmed figure of 197,000 affected individuals tells a different story. Personal information belonging to nearly 200,000 people was exposed, meaning the breach extended beyond purely transactional or operational records. The exact categories of personal data involved have not been fully detailed publicly.
Transaction records and purchase histories carry real risk even without financial data attached. That kind of information gives attackers enough context to craft highly targeted phishing messages, impersonating Zara with references to specific orders or purchase details.
ShinyHunters' Extortion Campaign
ShinyHunters listed Zara on its dark web portal in April 2026 alongside several other major brands, including 7-Eleven and Carnival Corporation. The group set an April 21 deadline for Inditex to open contact, threatening to publish the data if no agreement was reached.
No ransom payment was confirmed. The data was published on April 22, 2026, the day after the deadline passed.
This follows the group's standard playbook. ShinyHunters does not deploy ransomware to encrypt systems. Instead, it steals data and uses the threat of public disclosure as leverage. The campaign that ensnared Zara was not isolated. The same Anodot compromise was used against other companies, with Rockstar Games also confirmed as a victim. ShinyHunters has claimed to have breached approximately 400 targets across its various campaigns, with over 40 victim data sets published to date.
Inditex's Response
Inditex said it activated its security protocols immediately upon discovering the incident and began notifying relevant authorities. The company stated that its internal operations and systems were not affected and that customers could continue to use Zara's platforms safely.
As a company headquartered in Spain, Inditex falls under the EU's General Data Protection Regulation. GDPR requires organizations to report personal data breaches to supervisory authorities within 72 hours of becoming aware of them. Inditex stated it had begun the notification process, and the confirmed figure of 197,000 affected individuals likely reflects the scope established through that regulatory process.
Inditex has not publicly addressed whether the ShinyHunters extortion listing was directly connected to the contractor breach it disclosed, though the technical details align closely.
A Wider Pattern of Third-Party Risk
The Zara breach is one of several high-profile incidents this year tied to compromised third-party vendors. Attackers have increasingly targeted the integrations between large organizations and the analytics, cloud, and SaaS platforms they depend on. A breach at the vendor level can cascade into the environments of every company that trusted that vendor with access to its data.
For Inditex, the breach did not come from a gap in its own defenses. It came from a gap in a partner's. That distinction matters operationally, but it offers little comfort to the 197,000 people whose information was exposed.
Organizations that share data with external analytics platforms should treat those integrations as part of their threat surface, not outside it. Access should be scoped to the minimum required, monitored continuously, and reviewed whenever a provider relationship ends. In this case, the provider was already former. The access, clearly, was not.
Subscribe to receive the latest blog posts to your inbox every week.