Zara's gap exposes 197.400 emails and order data: the risk of suppliers and tokens in the SaaS era

Published 4 min de lectura 55 reading

Security records show that a gap that affected Zara-related databases has exposed information about 197.400 e-mail addresses along with commercial data such as order identifiers, SKUs and support tickets, according to the analysis published by Have I Been Pwned ( Have I Been Pwned: Zara). Inditex has confirmed that the committed databases were managed by a previous technology provider and states that no payment cards, passwords or, according to their version, full phones or addresses were accessed; however, commercial metadata filtration remains significant for the risk of social engineering.

The cybercrime group known as ShinyHunters has claimed the authorship and published a large file that, according to its claims, comes from BigQuery instances that they accessed with committed authentication tokens from the Anodot platform. This is a paradigmatic case of how the committed to third-party credentials and tokens can lead to mass leaks without directly attacking the retail's own systems; for more details on the attribution and the tilt disclosed, see the technical press report published by BleepingComputer ( BleepingComputer on filtration).

Zara's gap exposes 197.400 emails and order data: the risk of suppliers and tokens in the SaaS era
Image generated with IA.

Beyond the figures, what concerns is the usefulness of these data for attackers: Support tickets and purchase records offer context for convincing falsifications (phishing, vishing) and for customer service supplantations. Although financial data have not been disclosed, the combination of mail, markets and order details allows for targeted campaigns that substantially increase the success of subsequent fraud.

This incident is part of a broader trend: supplier-focused attacks, tokens exploitation and social engineering campaigns targeting SSO employee accounts to pivote towards SaaS connected applications. Inditex notified authorities and activated internal protocols, but has not yet made public the identity of the supplier concerned and the attribution of the actor. The absence of such information makes it difficult to fully assess the scope and corrective measures required.

If you are a potentially affected client, act quickly and prudently reduce risks: check if your mail appears in the Have I Been Pwned database, reinforce passwords and activate multifactor authentication (ideally with phishing-resistant methods, such as FIDO2 keys), distrust unexpected communications that refer to orders or support and avoid providing additional data by phone or mail. It is also appropriate to review the spam tray and mail forwarding rules and, where appropriate, to exercise data protection rights (request for access or deletion) to the company, based on the General Data Protection Regulation (RGPD).

Zara's gap exposes 197.400 emails and order data: the risk of suppliers and tokens in the SaaS era
Image generated with IA.

For companies and security officials, the incident is a reminder: the attack surface is extended to all suppliers and tokens that store or process data. To review third-party governance, rotation and secret management, to implement less privileged policies, to audit access to BigQuery and other cloud services, and to deploy behaviour-based detection are essential measures. In addition, strengthening SSO control (mandatory MFA, session monitoring and targeted phishing protection) and testing incident response scenarios with suppliers can make the difference between a contending incident and a mass leak.

Technically, the lesson is clear: tokenization and APIs simplify integration, but without robust controls they become critical vectors. Transparency in post-break communication and collaboration with authorities are key to minimizing reputational and legal damage; Inditex has already announced notifications to authorities, but customers and regulators expect more public details on mitigation and audits.

Finally, it is appropriate to contextualize: it is not an isolated fact, but part of a wave of leaks that shows repeated failures in the management of suppliers and credentials. If you want to go into the case and follow the official updates, in addition to the analysis of Have I Been Pwned and the technical reports, check the group's release on the notification and initial reactions of the company in media such as Market Watch ( Market Watch: Inditex warns of the gap).

Coverage

Related

More news on the same subject.