Skip to main content
Mallory

Vimeo links customer data exposure to Anodot supply-chain breach

third-party-vendor-breachunderground-data-leakcybercrime-service-ecosystemvoice-social-engineeringphishing-campaign-intelligence
Updated May 6, 2026 at 01:02 PM11 sources
Share:
Vimeo links customer data exposure to Anodot supply-chain breach

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Vimeo said a security incident exposed some user and customer data through a compromise at third-party analytics vendor Anodot, and linked the activity to the ShinyHunters cybercriminal ecosystem. According to Vimeo, the accessed information primarily included technical data, video titles and metadata, and in some cases customer email addresses; the company said video content, user login credentials, and payment card data were not accessed. ShinyHunters subsequently added Vimeo to its leak site and threatened to publish the data if a ransom was not paid.

Vimeo said it disabled Anodot credentials, removed the Anodot integration, engaged external security experts, and notified law enforcement while continuing its investigation. The company said its services were not disrupted, and reporting indicates the incident may be part of a broader supply-chain compromise involving Anodot that could affect multiple customers, consistent with recent ShinyHunters operations that have relied heavily on voice and email phishing to gain access rather than exploiting software vulnerabilities.

Timeline

  1. May 5, 2026

    ShinyHunters leaks Vimeo data; HIBP counts 119,200 exposed emails

    After failed extortion attempts, ShinyHunters reportedly published a 106GB Vimeo data archive on its leak site. Have I Been Pwned said the breach exposed the email addresses and, in some cases, names of 119,200 individuals.

  2. Apr 28, 2026

    ShinyHunters adds Vimeo to leak site and threatens data release

    The Record reported that ShinyHunters listed Vimeo on its leak site and threatened to publish the stolen data if a ransom was not paid. Vimeo linked the Anodot-related incident to the ShinyHunters cybercriminal ecosystem.

  3. Apr 27, 2026

    Vimeo removes Anodot access and notifies law enforcement

    In response to the incident, Vimeo said it disabled Anodot credentials, removed the Anodot integration, engaged third-party security experts, and notified law enforcement. Vimeo added that services were not disrupted and its investigation was ongoing.

  4. Apr 27, 2026

    Vimeo discloses customer data exposure tied to Anodot breach

    Vimeo said user and customer data was accessed through a breach affecting third-party analytics vendor Anodot. Exposed information primarily included technical data, video titles and metadata, and in some cases customer email addresses, while video content, login credentials, and payment card data were not accessed.

  5. Apr 27, 2026

    Arctic Wolf links broader Web3 targeting campaign to BlueNoroff

    Arctic Wolf disclosed a wider campaign involving more than 80 typo-squatted Zoom and Teams domains, over 950 attacker-hosted media files, and at least 100 identified targets across more than 20 countries. The company attributed the activity with high confidence to BlueNoroff based on infrastructure, tooling, targeting, and DPRK-business-hours activity patterns.

  6. Apr 27, 2026

    BlueNoroff maintains persistence for 66 days and expands victim impersonation pipeline

    During post-exploitation, the attackers used a fileless PowerShell implant, screenshot capture, browser process injection, a later UAC bypass, and persistence lasting 66 days. Arctic Wolf said stolen webcam footage and AI-generated images were reused to impersonate prior victims in future fake meetings.

  7. Apr 27, 2026

    BlueNoroff compromises a North American Web3 company via fake Zoom lure

    Arctic Wolf reported that a North American Web3/cryptocurrency company was compromised through a social-engineering chain involving a manipulated Calendly invite, a typo-squatted Zoom link, a fake meeting page, and ClickFix-style clipboard injection. The intrusion led to rapid compromise and subsequent credential, browser, wallet, and Telegram session theft.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Sources

May 6, 2026 at 10:13 AM
May 5, 2026 at 12:00 AM

5 more from sources like cyber security news, security affairs, teiss news, the record media and arctic wolf blog

Related Stories

Vercel Confirms Breach After Threat Actor Offers Alleged Stolen Data for Sale

Vercel Confirms Breach After Threat Actor Offers Alleged Stolen Data for Sale

Vercel confirmed a security incident involving unauthorized access to certain internal systems after a threat actor using the name **ShinyHunters** claimed to be selling allegedly stolen company data on a hacking forum. The company said only a limited subset of customers was affected, its services remain operational, and it has engaged incident response experts, notified law enforcement, and is working directly with impacted customers. The actor claimed the stolen data included access keys, source code, database data, internal deployment access, and API keys, and shared a text file with 580 employee-related records along with a screenshot purportedly showing an internal Vercel Enterprise dashboard. Vercel advised customers to review environment variables and rotate secrets if necessary, while the authenticity of the leaked materials and the attribution to **ShinyHunters** remained unverified; the actor also claimed on Telegram that a **$2 million** ransom demand had been discussed with the company.

1 weeks ago
ShinyHunters Claims Okta Vishing Campaign and Leaks Data from Crunchbase, Betterment, and SoundCloud

ShinyHunters Claims Okta Vishing Campaign and Leaks Data from Crunchbase, Betterment, and SoundCloud

The **ShinyHunters** extortion group claimed responsibility for a recent **Okta SSO voice-phishing (vishing)** campaign used to steal authentication codes and access victim environments. The group told reporters and researchers it used vishing to obtain Okta single-sign-on codes to compromise **Crunchbase** and **Betterment**, and then published alleged stolen data after the organizations reportedly rejected extortion demands; ShinyHunters also said additional victims exist and that more disclosures are forthcoming. ShinyHunters published alleged datasets for **Crunchbase, Betterment, and SoundCloud** on a newly launched leak site, asserting the dumps contain **PII** and large record counts (reported as **>20 million** for Betterment, **~2 million** for Crunchbase, and **~30+ million** for SoundCloud). **SoundCloud** stated it is aware of data published online allegedly taken from its organization and said its security team, supported by third-party experts, is reviewing the claim and the posted data; ShinyHunters asserted SoundCloud access was *not* obtained via SoundCloud’s Okta credentials. SoundCloud had previously confirmed a breach affecting roughly **20% of users** (about **28 million** based on public user counts), while Crunchbase and Betterment had not publicly responded at the time of reporting.

1 months ago
Stolen SaaS Integration Tokens Fuel Data Theft at Snowflake Customers

Stolen SaaS Integration Tokens Fuel Data Theft at Snowflake Customers

A breach at a third-party SaaS integration provider allegedly exposed authentication tokens that were then used to steal data from more than a dozen companies, with most of the activity targeting **Snowflake** customer environments. Snowflake said it detected unusual activity affecting a small number of customers tied to a specific third-party integration and emphasized that its own platform was not compromised through a vulnerability. Reporting identified the suspected source as **Anodot**, a data anomaly detection company owned by Glassbox, though neither company publicly responded at the time. The threat actor identified as **ShinyHunters** claimed responsibility, saying it stole data from dozens of organizations and sought extortion payments to prevent publication of the information. The campaign reportedly also targeted other cloud and SaaS providers, while an attempted theft involving **Salesforce** was said to have been blocked by AI-based detection. **Google Threat Intelligence Group** said it was tracking the incident, and **Payoneer** said it was aware of the provider breach linked to Anodot but had determined it was not affected.

6 days ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.

Vimeo links customer data exposure to Anodot supply-chain breach | Mallory