ShinyHunters Hit Vimeo Through a Vendor Nobody Was Watching

Records Exposed
119K
ShinyHunters
Data Confirmed Stolen
Email AddressesVideo MetadataInternal Technical DataCreator Account Info
Attack VectorThird-party vendor (Anodot) compromise
Data StatusReleased after extortion refused (Apr 30)

ShinyHunters did not breach Vimeo by attacking Vimeo. They breached Vimeo by compromising Anodot, a third-party analytics vendor that had an integration with Vimeo's data infrastructure. From Anodot's access, the attackers extracted 119,000 unique email addresses, video metadata, and internal technical data. After Vimeo declined to pay the extortion demand, ShinyHunters released the data ahead of their stated April 30 deadline.

The attack follows the same structural pattern as the Vercel breach: attackers found a smaller, less-defended vendor with trusted integration access to a larger target and used that vendor as the entry point. Anodot is not a company that appears on most enterprise security teams' threat model. It should.

The Vendor Access Problem

Anodot is an AI-powered business monitoring and analytics platform. Organizations use it to ingest business metrics, anomaly data, and operational telemetry. For Anodot to do its job, it needs access to the data it monitors. That access is often granted at a broad scope: direct database integrations, data warehouse connections, or API access to production systems. The vendor is trusted. The integration is provisioned. The security team's visibility into what that vendor can reach, and what their security posture looks like, is typically limited to a vendor questionnaire completed at onboarding.

The Visibility Gap

Most organizations do not audit third-party data access at the same level they audit direct employee access. A vendor integration that was scoped broadly two years ago may still be live, still be broadly scoped, and still be running on the vendor's infrastructure with no ongoing monitoring by the customer.

ShinyHunters' Vendor Access Playbook

ShinyHunters has established a consistent pattern in 2026: identify large target organizations, map their vendor ecosystem for weaker entry points, compromise a vendor, use that access to extract data from the primary target, and then use the data as leverage for extortion. When extortion fails, publish the data to establish credibility for future demands against other targets.

This playbook works because vendor access management is a known weak point. Enterprise organizations have mature controls for direct employee access: identity governance, access reviews, PAM for privileged accounts. Vendor and integration access frequently operates outside these controls. It is provisioned through a different process, reviewed less often, and monitored less closely.

Vimeo Breach Path
1
Target Mapping
ShinyHunters identifies Vimeo as a target; maps public information and job postings to enumerate vendor integrations
2
Anodot Compromised
Attackers breach Anodot's infrastructure; obtain credentials or access tokens for Vimeo's data environment
3
Data Extraction
119K email addresses, video metadata, and internal technical data extracted via the vendor's authorized access path
4
Extortion Demand
ShinyHunters contacts Vimeo with ransom demand and April 30 deadline; Vimeo declines to pay
5
Public Data Release
Data released before deadline; serves as proof-of-capability for future extortion campaigns against other targets

Third-Party Risk Is Part of Your Attack Surface

Every analytics tool, monitoring service, CRM integration, and data connector that touches your production data is a potential breach vector. The security controls on that vendor's infrastructure are outside your direct control. The access they have to your data was provisioned at a point in time and may not reflect the minimum access actually required for the integration to function.

A practical starting point: build a data access map. For every third-party service with access to production customer data, document what data it can reach, what credentials or tokens grant that access, when the integration was last reviewed, and what your offboarding process looks like if the vendor is compromised. Most organizations will find integrations on that list that nobody currently owns.

Minimum Viable Vendor Control

Segment vendor access. Analytics vendors do not need write access. Monitoring tools do not need PII. Where possible, provide vendors with synthetic or anonymized data rather than production records. Audit vendor access tokens annually at minimum and immediately when a vendor discloses a security incident.

Know What Your Vendors Can Access?

RedEye Security conducts third-party access audits and vendor risk assessments to identify and close the gaps that groups like ShinyHunters actively exploit.

Start an Assessment