Security & Infrastructure Tools
Video service Vimeo confirms Anodot breach exposed user data
Vimeo has disclosed that data from some customers and users was accessed in the wake of the Anodot breach. The exposed information reportedly includes email addresses for some users, plus technical details, video titles, and metadata, with no video content, credentials, or payment card data affected. The incident is linked to the ShinyHunters extortion group, which had threatened to publish stolen data by April 30; Vimeo has disabled Anodot credentials, severed the integration, and is collaborating with third-party security experts and law enforcement while it investigates and promises updates.

Vimeo Confirms Anodot Breach Exposed User Data
OverviewVimeo has disclosed that data belonging to some of its customers and users was accessed without authorization. The unauthorized access occurred in the wake of a breach at Anodot, a third‑party anomaly detection service. Vimeo’s initial findings indicate that the affected databases primarily contained technical data, video titles, and metadata, with some instances exposing customer email addresses. The company emphasizes that video content, account credentials, and payment card information were not exposed, and Vimeo’s own operations remained unaffected.
How the breach unfolded
- The exposure is linked to the Anodot security incident, in which attackers compromised authentication tokens and used them to enter customer environments, focusing on data stores such as Snowflake and BigQuery.
- The incident has been attributed to the ShinyHunters threat group, which has a history of extortion and data leakage campaigns.
- ShinyHunters publicly claimed Vimeo as a target, listing the breach on their extortion portal and asserting access to data from Vimeo’s Snowflake and BigQuery instances.
- The attackers’ stated goal was to monetize the stolen data through extortion, with threats to publish the compromised information if a ransom was not paid.
What data was exposed
- In Vimeo’s disclosure, the exposed information includes:
- Email addresses for some Vimeo customers
- Technical data, video titles, and related metadata associated with stored videos
- Crucially, Vimeo states that video content itself, user account passwords, and payment card data were not exposed.
- Vimeo also confirmed that its own systems and operations were not disrupted by the breach.
The threat actor and extortion angle
- The extortion group ShinyHunters claimed responsibility for the broader Anodot‑related activity and for attempting to monetize the breach.
- ShinyHunters reportedly warned Vimeo to expect “several annoying digital problems” if the demanded ransom was not paid.
- The extortion group has previously claimed to have exfiltrated large volumes of data from downstream victims, including prominent game studios and enterprise customers.
The Anodot incident connection
- Anodot’s breach involved attackers stealing authentication tokens and using them to access customer environments, with the primary impact centered on Snowflake environments and other data stores.
- The data accessed spanned multiple organizations, leading to concerns about downstream exposure beyond Anodot’s own systems.
- The connection to ShinyHunters amplified concerns about how the data could be monetized through public release or coercive means.
Vimeo’s response and mitigation
- Vimeo has disabled all Anodot credentials and removed the Anodot integration from its systems.
- The company has engaged third‑party security experts to assist with the investigation.
- Law enforcement authorities have been notified, and Vimeo stated that it would provide updates as the investigation progresses.
Current status and what’s known
- The breach was disclosed on April 28, 2026, amid threats from ShinyHunters to publish the data by April 30, 2026.
- The extent of stolen data in Vimeo’s case remains unclear, with no explicit figures released regarding the volume of data exfiltrated.
- Vimeo confirms that scope did not include the actual video content uploaded by users, nor account credentials or payment card information.
- The investigation is ongoing, with updates anticipated if new information emerges.
Notable context and related considerations
- Vimeo is a major video hosting and streaming platform, serving over 300 million registered users and maintaining a substantial enterprise footprint.
- The breach underscores the risk posed by third‑party services and data integrations, where token-based access can be leveraged to reach downstream environments.
- Related incidents in the ecosystem have involved other high‑profile victims and extortion campaigns, illustrating a broader pattern of data theft and public leakage attempts tied to third‑party services.
Key takeaways from the incident
- Access via stolen authentication tokens tied to a third‑party service can expose a wide range of metadata and non‑content data, even when primary assets (like video files) remain unaffected.
- Prompt disabling of third‑party credentials and removal of integrations can help contain exposure while a broader investigation runs its course.
- Coordination with third‑party security experts and law enforcement is a common and prudent response in such investigations, enabling more rapid containment and potential attribution.
As the investigation continues, Vimeo has signaled its commitment to providing updates if further critical information emerges. The incident serves as a reminder of the cascading risks associated with third‑party vendors and the importance of monitoring and limiting token‑based access across connected platforms.