Vimeo Data Breach Exposes 119,000 Emails via Anodot Compromise
ShinyHunters stole 119,000 Vimeo user emails through an Anodot breach, leaking video metadata but no passwords or payment data.
Visual sourcing
No source-linked image is attached to this story yet. Measured Take avoids generic stock art when a relevant credited image is not available.
TL;DR
ShinyHunters accessed 119,000 Vimeo user email addresses and video metadata by exploiting a breach at third‑party analytics provider Anodot; no login credentials or payment information were compromised.
Context In April 2026 Vimeo disclosed a security incident tied to Anodot, a cloud‑based analytics service used by the video platform. The breach was discovered after the ShinyHunters extortion group listed Vimeo on its “pay or leak” portal and later published a 106 GB data dump on a Tor site. Vimeo confirmed that the attacker accessed only technical data, video titles, metadata, and email addresses.
Key Facts - The unauthorized actor compromised Anodot’s environment, gaining read access to Vimeo’s customer database. - Attackers extracted 119,000 unique email addresses, many paired with user names. - Data released by ShinyHunters consisted mainly of video titles, technical details, and metadata; no video content, valid login credentials, or payment card information were found. - Vimeo responded by disabling the Anodot integration, removing the vendor’s access, and engaging external incident‑response experts. Law enforcement was notified. - ShinyHunters, known for social‑engineering attacks on SaaS platforms, has previously targeted the European Commission, Canada Goose, and SoundCloud. Their typical TTPs include voice phishing to harvest credentials and leveraging leak sites for extortion.
What It Means The breach highlights the risk of supply‑chain attacks where a trusted third‑party service becomes the entry point for attackers. Organizations that embed analytics or other SaaS tools must treat those connections as potential attack surfaces. While Vimeo’s core services remained operational, the exposure of email addresses increases the likelihood of phishing campaigns aimed at its user base.
Mitigations – What Defenders Should Do 1. Audit third‑party integrations – Review all vendor connections, enforce least‑privilege access, and require regular security assessments. 2. Implement zero‑trust network segmentation – Isolate vendor APIs from critical data stores to limit lateral movement. 3. Monitor for credential‑stuffing and phishing – Deploy email security gateways that detect anomalous sender domains and suspicious attachments. 4. Apply relevant patches – Ensure any known CVEs (Common Vulnerabilities and Exposures) affecting analytics platforms are patched promptly; watch for advisories from Anodot. 5. Enable multi‑factor authentication (MFA) – Require MFA for all privileged accounts, especially those with API access to customer data. 6. Conduct regular breach‑response drills – Simulate third‑party compromise scenarios to test detection and containment procedures.
Looking Ahead Security teams should monitor ShinyHunters’ activity for follow‑up leaks and watch for additional disclosures from Anodot regarding the root cause and any remediation patches.
Continue reading
More in this thread
Goodwin University Confirms Ransomware Attack Exposed PII and PHI of Nearly 900 Individuals
Peter Olaleru
Instructure Confirms Cyberattack Exposing Student Messages, Names, and IDs; Says Incident Contained
Peter Olaleru
Goodwin University Breach Exposes PII and PHI of 896 Residents Across Three States
Peter Olaleru
Conversation
Reader notes
Loading comments...