Hackers Leak Customer Data After Telco Refuses to Pay Ransom

Hackers Leak Customer Data After Telco Refuses to Pay Ransom

Finextra
FinextraMar 11, 2026

Why It Matters

The incident exposes telecoms to severe regulatory, reputational, and financial risks, underscoring the need for stronger cyber‑resilience strategies across the sector.

Key Takeaways

  • Over 6 million Odido customers' data exposed.
  • Ransom demand set at €1 million, refused by Odido.
  • Hackers leaked data daily, publishing millions of records.
  • Bank account numbers partially withheld for hackers' own use.
  • Incident highlights ransomware deterrence challenges for telcos.

Pulse Analysis

The breach underscores how ransomware groups have shifted from pure encryption attacks to large‑scale data exfiltration. In the Odido case, the ShinyHunters collective stole personal identifiers, contact details and financial information belonging to more than six million current and former subscribers. After demanding a €1 million ransom, the Dutch telecom declined, citing police advice and a policy against paying extortionists. Instead of encrypting systems, the attackers opted to publish a million lines of data each day, eventually releasing the bulk of the stolen files.

The exposure of names, phone numbers, birth dates and passport numbers raises immediate compliance concerns under the EU’s GDPR, which mandates swift breach notification and potential fines for inadequate protection. Financial institutions linked to the disclosed bank account numbers must also assess fraud risk, as the hackers indicated they retained those details for personal use. For Odido, the reputational fallout could translate into subscriber churn and heightened scrutiny from regulators, while customers face heightened identity‑theft threats and may need to monitor credit activity closely.

The incident highlights a broader strategic dilemma for telecom operators: whether to negotiate with cyber‑criminals or absorb the costs of a public disclosure. Industry analysts recommend investing in proactive threat hunting, zero‑trust network architectures, and regular penetration testing to reduce breach windows. Cyber‑insurance policies are also evolving, offering coverage that conditions payouts on demonstrated security controls. Collaboration with law‑enforcement and information‑sharing platforms can improve response times, but the ultimate safeguard remains a robust data‑governance framework that limits the value of stolen information. Without such measures, future attacks could cause even larger financial and legal repercussions.

Hackers leak customer data after telco refuses to pay ransom

Comments

Want to join the conversation?

Loading comments...