Was Your Zara Account Caught in This Data Breach—And What Should You Do Next?

May 8, 2026
by
Pulkit Gupta
deleteme

If you’ve ever bought something from Zara online, it’s fair to wonder if your account data is now sitting in someone else’s inbox. Inditex confirmed unauthorized access tied to a former technology provider, and Have I Been Pwned says 197,400 people were affected . The good news: Inditex says key data like passwords and payment card info wasn’t accessed . The bad news: the leaked details can still fuel scary-good phishing and account takeover attempts. Let’s break down what was exposed, what wasn’t, what the ShinyHunters leak claim adds to the story, and what you should do next—without panic, just smart moves.

What happened (and what was actually exposed)

Inditex’s confirmed story is pretty specific: unauthorized access hit databases hosted by a former technology provider. The data inside those systems was described as information about business relationships with customers across different markets, and Inditex said its core operations and systems weren’t impacted.

The easiest way to understand the “how many people” question is this: Inditex didn’t publish a customer count, but Have I Been Pwned (HIBP) analyzed the stolen dataset and reported 197,400 affected people. That’s where the widely shared “Zara data breach affected ~197k people” number comes from, and it’s why a lot of coverage references HIBP when talking about scope.

What data was exposed (plain English)

HIBP’s breakdown matters because it tells you what a criminal can realistically use to target you. According to HIBP, the Zara breach exposed:

  • Unique email addresses (the email tied to your Zara account or customer record)
  • Geographic locations (helpful for “your local delivery is delayed” style lures)
  • Purchases (signals you’ve actually shopped there, which makes scams more believable)
  • Support tickets (proof you interacted with customer service, plus context attackers can copy)
  • Product SKUs (specific items are an easy way to make a phishing email feel “real”)
  • Order IDs (gold for fake “order problem / refund pending” messages)
  • Market the support ticket originated in (basically, which country/region the record relates to)

If that list feels “not that sensitive,” it helps to remember what criminals optimize for: believability. A scammer doesn’t need your card number to mess up your week—they need enough detail to sound like Zara, sound like a courier, or sound like customer support.

What Inditex says was NOT accessed (and why that still doesn’t mean “no risk”)

It’s worth separating two ideas: what wasn’t taken vs. what attackers can still do with what they got.

What Inditex says attackers did not access

Inditex said the intruders didn’t gain access to:

  • Names
  • Phone numbers
  • Addresses
  • Credentials/passwords
  • Payment information (including bank card data)

That’s a real line in the sand. If you’re worried about instant card fraud straight from this incident, this is why many people can breathe a bit easier.

Why “no passwords leaked” still doesn’t mean “no risk”

Here’s the part people miss: most retail-account attacks don’t start with password cracking. They start with tricking you.

When an attacker has breach data tied to a shopping account, they can run targeted phishing that looks like normal retail noise—emails you’d usually skim and click.

The scams this kind of breach data feeds

Watch for messages that lean on order/support context and try to push you into urgency:

  • Fake delivery problem emails
    • “Your Zara package is held,” “address confirmation needed,” “delivery fee due”
    • Goal: get you to click a link and enter login details or payment info
  • Refund / return approval scams
    • “Your refund is ready—confirm the account”
    • Goal: steal card details or get you to “verify” your Zara login
  • Support-ticket impersonation
    • “Following up on your open case…”
    • Goal: pull you into a back-and-forth where you hand over more personal data
  • Account takeover attempts using your inbox as the real target
    • If a criminal can get into your email, they can reset passwords for lots of sites, Zara included
    • Goal: use password resets as the shortcut

Quick reality check (so you don’t get played)

If an email claims to be Zara and asks you to:

  1. Confirm a payment
  2. Log in from a link
  3. Download an invoice/label
  4. Share a one-time code

…treat it like a trap until you prove it’s legit. The safest move is typing Zara’s site address yourself or using the official app, not clicking the message.

This is why the Zara data breach can still be disruptive even without names, passwords, or card numbers in the exposed fields. Inditex’s “not accessed” list is good news , but it doesn’t stop criminals from using the remaining signals to make a scam feel personal.

The ShinyHunters angle: 140GB leak, BigQuery, and why token theft keeps showing up

If you’re trying to make sense of the scarier headlines, this is where they come from: the ShinyHunters extortion group claimed responsibility and leaked a reported 140GB archive tied to Zara/Inditex. The reporting says the documents were allegedly stolen from BigQuery instances using compromised Anodot authentication tokens.

Two important notes before anyone spirals:

  • This is a claim from a threat group, not a full technical post-mortem from Inditex. Inditex hasn’t publicly attributed the incident to a specific actor.
  • Even if you never heard of BigQuery or Anodot, the takeaway is simple: attackers didn’t have to “hack Zara.com” in the way people imagine. They can go around the front door.

What “BigQuery + tokens” means in normal-person terms

BigQuery is where organizations often keep big datasets for analytics and reporting. If someone gets access there, they’re not guessing—they’re pulling data in bulk.

And authentication tokens are basically “already-logged-in” proof. If a token is valid, the system often treats it like the user or service is authenticated.

Why token/SSO theft keeps working (even when passwords aren’t “cracked”)

A lot of modern companies run on SSO (single sign-on). One identity can open many doors.

BleepingComputer reports ShinyHunters has also been linked to a vishing campaign targeting Microsoft Entra, Okta, and Google SSO accounts, then using that access to steal data from connected SaaS apps like Salesforce, SAP, Slack, Adobe, Atlassian, Zendesk, Dropbox, Microsoft 365, and Google Workspace.

Here’s the pattern that matters:

  • Steal a token or SSO session
  • Hop into connected apps/data stores
  • Export what you can, fast
  • Extort later, leak if they don’t pay

That’s why these incidents can look confusing from the outside. You can have “no passwords exposed” in one dataset, while attackers still get plenty of access elsewhere by abusing tokens and SSO sessions.

What you should do next (15-minute checklist that actually helps)

If token-based theft and vendor-side incidents tell us anything, it’s this: you don’t wait for a “perfect” explanation. You tighten the obvious weak points and cut off the easy wins scammers look for.

0–5 minutes: protect the inbox scammers are aiming at

Your email account is the reset button for half your online life.

Do this now:

  • Turn on MFA for your email (Gmail, Outlook, iCloud). Use an authenticator app if you can.
  • Change your email password if it’s reused anywhere else, or if it’s old.
  • Check forwarding rules + filters (attackers love “silent forwarding” so you never see messages).
    • Look for rules that forward mail to an address you don’t recognize.
    • Look for filters that auto-archive, auto-delete, or mark as read.

5–10 minutes: scan for Zara-themed phishing (and block fast)

You’re not trying to read every email. You’re trying to spot patterns.

Red flags that show up in Zara phishing/refund/delivery scams:

  • Urgent money language: “fee due,” “final notice,” “refund expires”
  • Link pressure: “confirm,” “verify,” “release package,” “track now”
  • Attachments you weren’t expecting: “invoice.pdf,” “return-label.zip”
  • Sender mismatch: display name says Zara, but the email address is weird

Tactical move:

  • Search your inbox for “Zara”, “refund”, “return”, “delivery”, “track”, “order”.
  • Mark obvious scams as spam/phishing so your provider learns them.

10–12 minutes: lock down your Zara account (quick, not obsessive)

You’re aiming for “harder to hijack,” not perfect.

  • Change your Zara password (especially if you used it anywhere else).
  • Check account settings for anything that affects deliveries or contact:
    • saved addresses (if any), preferences, notifications
  • Review recent orders/returns for anything you don’t recognize.

12–14 minutes: tighten password manager hygiene (this is where people slip)

If you use a password manager, great. Use it correctly.

  • Generate a new, random password for Zara.
  • Audit the password manager for:
    • reused passwords across retail sites
    • weak/old passwords you “meant to update”

If you don’t use a password manager, this is the moment to start. Retail accounts are low-stakes until they become the entry point to your email, your card, or your identity.

14–15 minutes: reduce your blast radius for the next breach

Most people use one email for everything. That’s convenient, and it’s also why breaches follow you around.

A simple habit that helps:

  • Use a separate email (or email alias) for shopping accounts and newsletters.

If you want to do that without juggling inboxes, tools like Cloaked can create unique emails/aliases and identities for retailers. The point isn’t “more apps.” It’s making sure one exposed email doesn’t become a permanent tracking tag across every store you’ve ever used.

If you only do three things today

  1. Secure your email with MFA
  2. Change your Zara password (and stop reusing it)
  3. Stop clicking retail links from messages—open the app or type the site yourself

Lessons for organizations: third-party risk and token hygiene (the part that keeps repeating)

Consumers can lock down accounts all day, but incidents like this keep happening for one reason: risk sits in the gaps—former vendors, long-lived access, and tokens that act like skeleton keys.

Inditex tied the unauthorized access to a security incident affecting a former technology provider . Reporting also described a ShinyHunters leak claim involving BigQuery data and compromised authentication tokens, plus a broader pattern of SSO account theft leading to downstream SaaS data access . Put those together and the lesson is blunt: “We don’t store cards” won’t save you if your data estate is wide open through someone else.

Controls that would’ve reduced impact

Third-party access: treat offboarding like an incident

If a former provider can still be a path in, your offboarding isn’t done.

  • Quarterly third-party access reviews (not just annual questionnaires)
  • Contractual kill-switch: the right to revoke access immediately and verify revocation
  • “Former vendor” scanning: find service accounts, API keys, and data shares tied to old providers

Inditex’s note that the affected databases were hosted by a former provider is the exact scenario these controls are meant to catch .

Token hygiene: shorten the window attackers can operate in

The ShinyHunters reporting around compromised tokens is a reminder that attackers love access that doesn’t require guessing passwords .

Do the basics, aggressively:

  • Short-lived tokens by default (minutes/hours, not weeks)
  • Rotation + revocation playbooks that don’t require a committee meeting
  • Scope tokens tightly (tokens that can read “everything” will read everything)
  • Separate human tokens vs. service tokens, and monitor them differently

BigQuery / analytics governance: limit “who can query what”

Analytics platforms are high-value because they centralize data.

  • Enforce least-privilege at the dataset/table level
  • Lock down service account permissions so they can’t enumerate and export broadly
  • Add egress controls where possible (large exports should be noisy)

The part that keeps repeating: SSO is a force multiplier (for you and for attackers)

BleepingComputer reported ShinyHunters being linked to vishing targeting Microsoft Entra, Okta, and Google SSO accounts, then using that access to pull data from connected SaaS apps .

SSO hardening isn’t optional anymore:

  • Phishing-resistant MFA for admins and high-risk roles
  • Conditional access (new device, new geo, impossible travel = step-up or block)
  • Limit what SSO can reach (segment apps, separate tenants/environments where it makes sense)
  • Kill legacy auth paths that bypass modern controls

What to audit this week (practical, not theoretical)

If you run security or IT, this is a tight list you can actually execute:

  1. Vendor offboarding audit
    • List all third parties with data access
    • Identify “former providers” with any lingering accounts or integrations
  2. Token inventory + rotation
    • Gather API keys, OAuth tokens, service account keys
    • Rotate the riskiest ones first (broad scopes, old issuance dates, shared across teams)
  3. SSO access review
    • Verify MFA coverage
    • Review risky sign-in patterns and high-privilege role assignments
    • Run a quick vishing/phishing tabletop that assumes the attacker gets an SSO session
  4. Analytics platform permissions check
    • Validate least-privilege in BigQuery (or your equivalent)
    • Confirm logging is on and someone is looking at it, not just storing it

None of this is glamorous. It’s the boring work that stops the “former provider + tokens + SaaS sprawl” chain from turning into your next headline.

View all

Could Your GeForce NOW Account Be in the Armenia Breach—What Was Exposed and What Should You Do Now?

Data Breaches
by
Arjun Bhatnagar

Want to Give Your Mom Something That Really Matters This Mother’s Day? Start With Her Online Safety

Data Breaches
by
Arjun Bhatnagar

Could Your Next Telegram Click Be a Crypto Scam—or Even Android Malware?

Data Breaches
by
Abhijay Bhatnagar