Have I Been Pwned 及多份報道指,Zara 事件約有 197,400 筆客戶紀錄受影響,涉及電郵地址、地區/市場資料、購買或訂單資料,以及客服工單資料。[4][5][10] 安全報道將事件連繫到勒索組織 ShinyHunters,指對方聲稱利用被盜的 Anodot 認證 token 存取 BigQuery 資料;但 Inditex 尚未公開完整技術調查報告。[5][8][10]

Create a landscape editorial hero image for this Studio Global article: What personal data was exposed in the Zara third-party breach, and how did ShinyHunters gain access to it?. Article summary: The exposed Zara data reportedly included about 197,400 customer records, mainly email addresses, geographic/location market data, purchase/order information, and support-ticket data. ShinyHunters appears to have accesse. Topic tags: general, general web. Reference image context from search candidates: Reference image 1: visual subject "# Zara Data Breach Exposed Personal Information of 197,000 People. Have I Been Pwned has confirmed that a data breach at Spanish fast-fashion retailer Zara exposed the personal inf" source context "Zara Data Breach Exposed Personal Information of 197,000 People" Reference image 2: visual subject "# Zara Data Breach Exposed Personal Information of 197,000 People.
Studio Global AI
Use this topic as a starting point for a fresh source-backed answer, then compare citations before you share it.
Have I Been Pwned 及多份報道指,Zara 事件約有 197,400 筆客戶紀錄受影響,涉及電郵地址、地區/市場資料、購買或訂單資料,以及客服工單資料。[4][5][10]
Have I Been Pwned 及多份報道指,Zara 事件約有 197,400 筆客戶紀錄受影響,涉及電郵地址、地區/市場資料、購買或訂單資料,以及客服工單資料。[4][5][10] 安全報道將事件連繫到勒索組織 ShinyHunters,指對方聲稱利用被盜的 Anodot 認證 token 存取 BigQuery 資料;但 Inditex 尚未公開完整技術調查報告。[5][8][10]
繼續“NACHO交易懶人包:華爾街點解押注霍爾木茲海峽唔會快開返”以獲得另一個角度和額外的引用。
開啟相關頁面對照「Big Tech 點解湧入全球債市?AI基建戰已唔止靠現金流」交叉檢查此答案。
開啟相關頁面Inditex, the Spanish retail giant behind Zara, has confirmed a data breach that exposed the personal information of 197,000 people. The breach did not originate inside Inditex's own systems. Instead, it traced back to a former third-party technology provide...
Inditex confirmed unauthorized access tied to a former technology provider, and Have I Been Pwned says 197,400 people were affected . The good news: Inditex says key data like passwords and payment card info wasn’t accessed . The bad news: the leaked detail...
Hackers who gained access to the databases of Spanish fast-fashion retailer Zara stole data belonging to more than 197,000 customers, according to data breach notification service Have I Been Pwned. ... While Inditex and Zara have yet to disclose more deta...
On May 8, 2026, the breach notification service Have I Been Pwned added Zara to its database, formalizing what ShinyHunters had been threatening for weeks. The dataset that ended up on the leak portal contained 197,400 unique email addresses tied to Zara cu...
呢類資料未必可以直接令你「被盜卡」,但可以令詐騙訊息包裝得好貼身。例如對方可以引用你真實電郵、所在地區、某張訂單、曾買過嘅產品,或者客服查詢內容。Cloaked 的分析亦提醒,即使無密碼或卡資料,相關資料仍可被用於釣魚及帳戶接管嘗試。[4]
Inditex 據報表示,密碼及信用卡付款資料未被存取。[4] Daily.dev 的摘要亦指,姓名、電話號碼、地址、登入憑證及付款資料未有受影響;不過,呢點仍要同另一個事實一齊理解:Inditex 未有公開完整技術細節或正式事後調查報告。[
5][
10]
其後,多個安全報道將事件連繫到 ShinyHunters。BleepingComputer 指,呢個勒索組織聲稱負責事件,並稱外洩資料來自 BigQuery 環境,入手方法是使用被盜的 Anodot 認證 token。[5] 其他報道亦將 Anodot 這間數據分析供應商,列為進入下游客戶資料的疑似第三方路徑。[
8][
10][
11]
講白啲,據報路徑唔係「黑入 Zara 收銀機」或「攻破 Zara 結帳頁」,而係:先取得或濫用有效嘅第三方認證 token,再透過呢啲權限進入相連嘅雲端資料倉庫,最後匯出當中資料。呢個說法同 Inditex 指事件源自前供應商、而非 Inditex 內部系統嘅說法吻合。[1][
4][
5]
公開資料仍未等同一份完整鑑證報告。BleepingComputer 提到,Inditex 及 Zara 尚未披露事件全部細節,包括官方完整受影響人數。[5]
至於 ShinyHunters 的具體入侵方法,目前亦有部分來自威脅組織自身聲稱及安全媒體報道。因此,較準確講法係:這是現時最主要、最常被引用的報道版本,而唔係已由 Inditex 完整確認嘅技術結論。[5][
8][
10]
另一個未完全一致嘅位係資料包大小。BleepingComputer 及 Daily.dev 提到 140GB 檔案;Cork Safety Alerts 則引述 ShinyHunters 聲稱,資料來自 BigQuery 雲端環境,大小為 192GB。[5][
10][
11] 對普通用戶嚟講,更實際嘅參考數字仍然係 Have I Been Pwned 相關通報所指:約 197,400 筆受影響紀錄。[
4][
5][
10]
如果你嘅電郵地址可能出現在資料集中,之後見到任何 Zara 相關電郵或短訊,都要打醒十二分精神。特別係以下主題:退款、送貨問題、付款失敗、會員獎賞、客服工單、訂單確認或補交資料。
最穩陣做法係:唔好直接撳電郵或短訊入面嘅連結;如要查訂單、退款或帳戶資料,自己打開 Zara 官方網站或官方 app。
對保安團隊而言,據報涉及 token 同雲端資料倉庫嘅路徑,亦指向幾個老生常談但非常關鍵嘅控制位:離職或停用供應商要撤銷權限、定期輪換認證 token、限制雲端資料倉庫權限、監察異常大量匯出,以及審計邊啲人或系統可以接觸客戶資料集。[5][
8][
10]
總結一句:Zara 今次外洩資料未至於等同密碼或信用卡外洩,但仍然夠個人化,足以被用嚟做高仿真釣魚詐騙。真正值得警惕嘅,唔單止係外洩咗咩,更係一條第三方連接點,點樣令全球零售品牌嘅客戶資料變得可被觸及。[4][
5][
10]
Inditex confirmed roughly 197,000 Zara customer records were exposed via Anodot, an Israeli AI analytics platform compromised by ShinyHunters. The crew used stolen authentication tokens to pivot into BigQuery instances of multiple downstream customers, haul...
Hackers breached databases of a former technology provider used by Zara (Inditex), exposing data of 197,400 people including email addresses, geographic locations, purchases, and support tickets. The ShinyHunters extortion gang claimed responsibility, alleg...
A series of new entries on a dark web leak site linked to the hacking group ShinyHunters has named Zara, Udemy and 7-Eleven, with stolen data now circulating online. ... In each case, ShinyHunters states that negotiations with the companies failed before th...
Inditex, the owner of Zara, has disclosed a data breach linked to a former technology provider, stating that no customer data was exposed. However, the ShinyHunters extortion group has since listed Zara on its leak site, claiming it will publish stolen data...