About 197,400 Zara customer records were reportedly exposed, including email addresses, geographic market/location data, purchase or order information, and support ticket data; Inditex said passwords and payment card... Security reporting links the incident to ShinyHunters and the alleged use of compromised Anodot a...

Create a landscape editorial hero image for this Studio Global article: What personal data was exposed in the Zara third-party breach, and how did ShinyHunters gain access to it?. Article summary: The exposed Zara data reportedly included about 197,400 customer records, mainly email addresses, geographic/location market data, purchase/order information, and support-ticket data. ShinyHunters appears to have accesse. Topic tags: general, general web. Reference image context from search candidates: Reference image 1: visual subject "# Zara Data Breach Exposed Personal Information of 197,000 People. Have I Been Pwned has confirmed that a data breach at Spanish fast-fashion retailer Zara exposed the personal inf" source context "Zara Data Breach Exposed Personal Information of 197,000 People" Reference image 2: visual subject "# Zara Data Breach Exposed Personal Information of 197,000 People.
Zara’s breach is best understood as a third-party data exposure. Inditex, Zara’s parent company, tied the incident to unauthorized access at a former technology provider, while breach-notification reporting put the affected population at about 197,400 people. [1][
4][
5] The exposed data appears useful for targeted scams even though current reporting says passwords and payment-card data were not accessed. [
4][
10]
Have I Been Pwned listed the Zara incident as affecting more than 197,000 people, with several reports giving the figure as 197,400 records. [4] The exposed fields reportedly included:
Studio Global AI
Use this topic as a starting point for a fresh source-backed answer, then compare citations before you share it.
About 197,400 Zara customer records were reportedly exposed, including email addresses, geographic market/location data, purchase or order information, and support ticket data; Inditex said passwords and payment card...
About 197,400 Zara customer records were reportedly exposed, including email addresses, geographic market/location data, purchase or order information, and support ticket data; Inditex said passwords and payment card... Security reporting links the incident to ShinyHunters and the alleged use of compromised Anodot authentication tokens to reach BigQuery hosted data, but Inditex has not published a full technical postmortem.
Continue with "NACHO Trade Explained: Wall Street’s Bet That Hormuz Stays Shut" for another angle and extra citations.
Open related pageCross-check this answer against "Big Tech’s AI Infrastructure Race Is Moving Into Global Bond Markets".
Open related pageInditex, the Spanish retail giant behind Zara, has confirmed a data breach that exposed the personal information of 197,000 people. The breach did not originate inside Inditex's own systems. Instead, it traced back to a former third-party technology provide...
Inditex confirmed unauthorized access tied to a former technology provider, and Have I Been Pwned says 197,400 people were affected . The good news: Inditex says key data like passwords and payment card info wasn’t accessed . The bad news: the leaked detail...
Hackers who gained access to the databases of Spanish fast-fashion retailer Zara stole data belonging to more than 197,000 customers, according to data breach notification service Have I Been Pwned. ... While Inditex and Zara have yet to disclose more deta...
On May 8, 2026, the breach notification service Have I Been Pwned added Zara to its database, formalizing what ShinyHunters had been threatening for weeks. The dataset that ended up on the leak portal contained 197,400 unique email addresses tied to Zara cu...
That combination matters because it can make phishing messages look more believable: an attacker may be able to reference a real email address, market, order, product, or support interaction. Cloaked’s write-up warned that the leaked details could still fuel phishing and account-takeover attempts even without passwords or card numbers. [4]
Inditex reportedly said passwords and payment-card information were not accessed. [4] Daily.dev’s summary also reported that names, phone numbers, addresses, credentials, and payment data were not compromised, but that should still be read alongside the broader caveat that Inditex has not publicly released a full technical breakdown of the incident. [
5][
10]
For customers, the practical takeaway is that this does not look like a payment-card breach based on current reporting. The more immediate risk is social engineering: emails or messages that pretend to be about a Zara order, refund, delivery problem, or support case. [4][
7][
10]
Inditex’s confirmed account points outside Zara’s own infrastructure: the unauthorized access was tied to databases hosted by a former technology provider or external contractor. [1][
4][
13]
Security reporting then connected the incident to ShinyHunters. BleepingComputer reported that the extortion group claimed responsibility and said it leaked data allegedly taken from BigQuery instances using compromised Anodot authentication tokens. [5] Other reports similarly identify Anodot, an analytics provider, as the alleged third-party route into downstream customer data. [
8][
10][
11]
In plain terms, the reported path was not “hack Zara’s checkout page.” It was closer to: compromise or obtain valid third-party authentication tokens, use those tokens to reach connected cloud data environments, and exfiltrate data held there. That distinction matches Inditex’s statement that the incident originated with a former provider rather than inside Inditex’s own systems. [1][
4][
5]
The public record is not as complete as a formal forensic report. BleepingComputer noted that Inditex and Zara had not disclosed all details of the incident, including a complete official count of affected people. [5] The specific ShinyHunters access method also relies partly on threat-actor claims and secondary security reporting, so it should be treated as the leading reported explanation rather than a fully confirmed technical finding. [
5][
8][
10]
Reports also vary on the claimed archive size: BleepingComputer and Daily.dev cite a 140GB archive, while Cork Safety Alerts cited a ShinyHunters claim of 192GB from BigQuery cloud instances. [5][
10][
11] For individual customers, the more useful number is the record count reported through Have I Been Pwned: roughly 197,400 affected entries. [
4][
5][
10]
If your email address may have been in the dataset, treat unsolicited Zara-related messages with caution. Do not click links in emails or texts about refunds, delivery issues, payment failures, loyalty rewards, or support tickets; go directly to Zara’s official site or app instead.
Because current reporting says passwords and payment-card data were not accessed, mass card replacement is not the obvious first step based on the known facts. [4][
10] Still, change any reused password if you used the same credentials across retail accounts, and enable multi-factor authentication where available.
The incident shows why third-party analytics and cloud-data connections can create customer-data exposure even when a retailer says its own core systems were not directly breached. [1][
4][
13] For security teams, the reported token-and-data-warehouse path points to familiar controls: revoke access for former vendors, rotate authentication tokens, restrict cloud warehouse permissions, monitor unusual exports, and audit who can reach customer datasets. [
5][
8][
10]
The bottom line: the exposed Zara data was narrower than a password or payment-card breach, but it was still personal enough to be abused. The risk is not only what was leaked, but how a third-party connection allegedly made a global retail brand’s customer data reachable in the first place. [4][
5][
10]
Inditex confirmed roughly 197,000 Zara customer records were exposed via Anodot, an Israeli AI analytics platform compromised by ShinyHunters. The crew used stolen authentication tokens to pivot into BigQuery instances of multiple downstream customers, haul...
Hackers breached databases of a former technology provider used by Zara (Inditex), exposing data of 197,400 people including email addresses, geographic locations, purchases, and support tickets. The ShinyHunters extortion gang claimed responsibility, alleg...
A series of new entries on a dark web leak site linked to the hacking group ShinyHunters has named Zara, Udemy and 7-Eleven, with stolen data now circulating online. ... In each case, ShinyHunters states that negotiations with the companies failed before th...
Inditex, the owner of Zara, has disclosed a data breach linked to a former technology provider, stating that no customer data was exposed. However, the ShinyHunters extortion group has since listed Zara on its leak site, claiming it will publish stolen data...