What happened
Vimeo has confirmed that an unauthorized actor accessed certain user and customer data as a result of a breach at Anodot, a third-party data anomaly detection provider. The exposed data primarily consists of technical data, video titles, and metadata, with customer email addresses also accessed in some cases. Vimeo stated that uploaded video content, account credentials, and payment card information were not affected, and that platform operations remained unaffected.
The Anodot incident involved attackers stealing authentication tokens and using them to access customer environments, primarily Snowflake instances, to exfiltrate data from multiple downstream organizations. ShinyHunters, which has been linked to the Anodot campaign, listed Vimeo on its extortion portal on April 27, claiming to have data from the company’s Snowflake and BigQuery instances and setting an April 30 deadline before threatening to publish the stolen data. The group also warned Vimeo to expect additional disruptive digital actions. The volume of stolen data has not been specified by the threat actor.
Rockstar Games is another confirmed downstream victim of the Anodot breach, with ShinyHunters claiming to have exfiltrated more than 78.6 million records from the game studio. Vimeo has disabled all Anodot credentials, removed the integration from its systems, engaged third-party security experts, and notified law enforcement. The investigation is ongoing.
Who is affected
Vimeo users and customers whose email addresses or technical metadata were stored in the Anodot-connected environment face potential exposure. The full scope of affected individuals has not been determined, though Vimeo has over 300 million registered users. The Anodot breach appears to have affected multiple organizations beyond Vimeo and Rockstar Games, suggesting a broader downstream victim population.
Why CISOs should care
The Anodot breach is another example of a SaaS analytics provider becoming the pivot point for attacks against multiple high-profile customers simultaneously. Authentication tokens stolen from a single data platform integration provided access to Snowflake and BigQuery environments across several organizations. For security leaders, the relevant question is not whether their primary systems are secure, but whether their analytics, monitoring, and data integration vendors hold tokens or credentials that provide equivalent access to sensitive data environments.
ShinyHunters’ use of the same Anodot access to reach multiple downstream victims also illustrates the multiplier effect of SaaS integrations as an attack vector.
3 practical actions
- Audit all third-party analytics and monitoring integrations for token and credential exposure: The Anodot breach was enabled by stolen authentication tokens. Review which vendors hold tokens providing access to your Snowflake, BigQuery, or other data warehouse environments, assess what data those tokens can reach, and rotate credentials for any integration that cannot be confirmed as unexposed.
- Implement least-privilege scoping on all data platform integrations: Analytics and anomaly detection tools rarely need access to entire data warehouses. Review the permissions granted to each integration and restrict access to the minimum datasets required for the tool’s specific function, limiting the blast radius if a vendor is compromised.
- Include SaaS vendor breach scenarios in your incident response planning: Vimeo’s exposure came not from a direct attack but from a breach at a monitoring provider. Ensure your incident response plan includes procedures for third-party SaaS breaches, including rapid credential revocation, integration disabling, and scope assessment for data accessible through vendor tokens.
Also in the news today:
- Cyber Command and NSA Chief Warns Foreign Adversaries Likely to Target Midterms
- Checkmarx Confirms LAPSUS$ Hackers Leaked Its Stolen GitHub Data
- Hackers Are Exploiting a Critical LiteLLM Pre-Auth SQL Injection Flaw
- Broken VECT 2.0 Ransomware Acts as a Data Wiper for Large Files
- Feuding Ransomware Groups Leak Each Other’s Data, Exposing Operations to Defenders
