Major global brands including Zara, Carnival and 7 Eleven have been targeted in a ransomware campaign by the ShinyHunters group. The attackers issued a “pay or leak” ultimatum, threatening to release over 9 million records containing sensitive personal and corporate data, highlighting the growing scale and impact of data extortion attacks.

A New Phase of Data Extortion

A recent cyber incident involving ShinyHunters highlights a shift in how ransomware attacks are evolving. Instead of focusing solely on encrypting systems, attackers are increasingly prioritising data theft and public exposure.

In this case, major global brands such as Zara, Carnival Corporation and 7 Eleven were issued a clear ultimatum. Pay the ransom or face public data leaks. The group warned that more than 9 million records containing personally identifiable information and internal data were at risk.  

From Ransomware to Data Exposure

This incident reflects a broader trend where attackers no longer rely on encryption alone. Instead, they exfiltrate large volumes of sensitive data and use public leak sites as leverage.

In many cases, even if systems remain operational, organisations face significant risk through

  • Exposure of customer and employee data
  • Increased phishing and identity theft risks
  • Reputational damage and regulatory consequences

Subsequent reports indicate that such campaigns can involve tens of millions of records and terabytes of internal data, signalling a growing scale of impact.  

The Expanding Attack Surface

Another critical aspect of this incident is how breaches are occurring. The attack has been linked to vulnerabilities in third party platforms and cloud ecosystems, demonstrating how interconnected systems can amplify risk.  

This highlights a key reality
Organisations are no longer only securing their own infrastructure but also the extended digital ecosystem they rely on.

Trevonix Perspective

At Trevonix, this incident reinforces a fundamental shift in cyber security

The primary risk is no longer system downtime but uncontrolled data exposure

As attackers move towards data centric extortion, organisations must evolve their security strategies beyond traditional perimeter and endpoint protection

This requires

  • Strong identity governance across all users and systems
  • Continuous monitoring of access and behaviour
  • Tight control over third party and cloud integrations
  • Protection of sensitive data at every stage of access and usage

Most importantly, identity must become the central control layer. Every access request, whether from a user, application or AI agent, must be verified, monitored and governed in real time

Conclusion

The ShinyHunters campaign highlights how cyber threats are becoming more aggressive, targeted and data driven.

Organisations that prioritise identity led security and continuous governance will be better positioned to prevent, detect and respond to these evolving threats while protecting both data and trust

Reference: https://cybernews.com/security/zara-carnival-7eleven-ransomware-shinyhunters-leak-warning/

Continue reading
View All
View All
Contact us

Get in touch with us

Whether you have a question, need support, or just want to learn more about Trevonix, our team is here to help.
Need help? Our support team is available 24/7 to assist you.
Interested in Trevonix for your business? Reach out to discuss pricing and solutions.
Send us a message
Tell us how we can help you.
chevron down icon
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

See It in Action

See how our approach works in real scenarios, not slides.
Book an IAM consultation to experience solutions shaped by real world use cases.