Severity
high
Records
5,100,000
Vector
Vishing — Microsoft Entra SSO compromise
Organization
Panera Bread
Incident Date
2026-01-15

What Happened

Panera Bread, the American bakery-café chain, suffered a data breach in January 2026 when the ShinyHunters cybercriminal group compromised their systems through a Microsoft Entra SSO vishing attack. After Panera refused extortion demands, ShinyHunters leaked 5.1 million customer records containing personal information.

Incident overview

AttributeDetails
VictimPanera Bread
IndustryRestaurant/Food service
Attack dateJanuary 2026
DiscoveryJanuary 2026
Accounts affected5,100,000
Initial claim14 million records
Attack methodMicrosoft Entra SSO vishing
Threat actorShinyHunters
Ransom demandedYes
Ransom paidNo
Data leakedYes (760GB archive)

Timeline

DateEvent
January 2026ShinyHunters initiates vishing campaign
January 2026Microsoft Entra SSO credentials compromised
January 2026Attackers access Panera systems
January 202614 million records exfiltrated
January 2026Extortion demand issued
January 2026Panera refuses payment
February 2, 2026760GB archive leaked on Tor site
February 2026HIBP confirms 5.1 million unique accounts

Data exposed

Customer information

Data typeStatus
Full namesConfirmed
Email addressesConfirmed
Phone numbersConfirmed
Home addressesConfirmed
Account detailsConfirmed

Employee information

Data typeScope
Employee emails~26,000 @panerabread.com addresses
Employee PIIIncluded in breach

NOT confirmed exposed

Data typeStatus
Payment card dataNo evidence of exposure
Financial informationNot confirmed

Attack methodology

Vishing campaign

StageDetails
TargetPanera employee with SSO access
MethodVoice phishing (vishing)
GoalObtain Microsoft Entra SSO credentials
OutcomeSuccessful credential theft

ShinyHunters has been conducting widespread vishing campaigns targeting SSO accounts at organizations using Okta, Microsoft Entra, and Google authentication across more than 100 high-profile companies.

SSO exploitation

StepAction
1Social engineer employee via phone
2Obtain Microsoft Entra SSO code
3Use code to access Panera systems
4Exfiltrate customer and employee data
5Issue extortion demand

Record count clarification

MetricCount
Records stolen14 million
Unique accounts5.1 million
DifferenceMultiple records per customer

Have I Been Pwned analysis determined that while 14 million records were stolen, these represent approximately 5.1 million unique individuals, as many customers had multiple account records.

ShinyHunters campaign context

The Panera breach was part of a broader ShinyHunters vishing campaign:

TargetOutcome
Panera Bread5.1M accounts leaked
Match Group”Limited” user data stolen
SoundCloud29.8M accounts leaked
Harvard/UPenn2M+ records leaked
Crunchbase2M+ records leaked

Business impact

ImpactDetails
Data exposure5.1 million customers
Employee exposure~26,000 employees
Reputational damagePublic leak on dark web
Regulatory riskPotential state AG investigations
Notification costsRequired breach notifications

Recommendations

For affected customers

PriorityAction
CriticalCheck Have I Been Pwned for your email
HighChange Panera account password
HighWatch for phishing emails referencing Panera
HighMonitor for suspicious activity using your info
MediumConsider credit monitoring if address exposed

For organizations

PriorityAction
CriticalImplement phishing-resistant MFA (FIDO2)
CriticalTrain employees on vishing attacks
HighMonitor SSO authentication anomalies
HighImplement callback verification for sensitive requests
MediumSegment access based on need

Context

The Panera Bread breach demonstrates ShinyHunters’ refined attack playbook: target SSO credentials through vishing, bypass technical controls via social engineering, and extort or leak when payment is refused.

The use of Microsoft Entra SSO as the attack vector highlights that modern authentication systems are only as secure as the humans who use them. Phishing-resistant MFA (hardware keys, FIDO2) would have prevented this attack, as social engineering cannot bypass physical authentication requirements.

For affected customers, the exposure of names, emails, phone numbers, and addresses creates significant phishing risk. Attackers can craft highly convincing messages referencing Panera orders, rewards programs, or account issues. Verifying communications through official channels rather than clicking links is essential.

The 5.1 million affected individuals should expect increased spam and potential targeted scams. While payment data was not confirmed exposed, the combination of personal details enables identity-related fraud attempts that may persist for years.