Loading...
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

ShinyHunters Claims Carnival Corporation Breach, 8.7 Million Records Allegedly Stolen

Stylized dark ocean scene at night with crashing waves and cascading green digital code resembling a Matrix-style waterfall, creating a cyber-threat atmosphere behind an overlaid cruise line logo.

ShinyHunters has claimed a data breach at Carnival Corporation, the world’s largest cruise operator, alleging the theft of over 8.7 million records containing personally identifiable information alongside terabytes of internal corporate data. The claim surfaced April 18, 2026. Carnival has confirmed a phishing incident but has not verified the scope of the alleged exfiltration.

What Carnival Has Confirmed

Carnival acknowledged suspicious activity in a public statement, attributing the intrusion to a phishing attack targeting a single user account. “We acted quickly to block unauthorized activity following a phishing incident involving a single user account,” the company said. “We’re working with top global security experts to better understand the scope of the activity.” Carnival has not confirmed whether customer data was compromised, how many individuals may be affected, or what categories of data were accessed. The investigation is described as ongoing.

ShinyHunters claims the exfiltration covered over 8.7 million records of PII and additional terabytes of internal corporate data. The specific data types, whether passenger records, employee files, passport numbers, or operational documents, have not been independently verified.

A Familiar Attack Vector for a Repeat Target

The phishing vector Carnival described is the same entry point the company has faced repeatedly over the past seven years. Between 2019 and 2021, Carnival suffered 4 separate security incidents: 2 ransomware attacks and 2 phishing intrusions that collectively exposed passport numbers, Social Security numbers, dates of birth, health information, and payment card data belonging to customers, employees, and crew across Carnival Cruise Line, Holland America Line, Princess Cruises, and Costa Cruises.

The regulatory fallout was significant. A 46-state attorney general coalition reached a $1.25 million settlement with Carnival in 2022 over its 2019 breach, which exposed data on 180,000 individuals. The New York Department of Financial Services separately fined the company $5 million. As conditions of those settlements, Carnival agreed to implement mandatory phishing training for employees, enforce multi-factor authentication for remote email access, and adopt enhanced network monitoring. The 2026 incident originated from a phishing attack on a single account, the same vector Carnival was specifically required to harden against as part of those agreements.

ShinyHunters’ Broader April Campaign

The Carnival claim is part of a wider ShinyHunters activity wave in mid-April that named at least 9 major organizations across multiple industries. Other victims listed in the same period include Zara parent company Inditex, which confirmed unauthorized database access and linked the incident to a compromise at a third-party technology provider, as well as 7-Eleven, Medtronic, Pitney Bowes, and Canada Life Assurance Company. Several of those listings have been tied to the group’s ongoing Salesforce misconfiguration exploitation campaign, covered previously in our reporting on Hallmark Cards and the broader Amtrak and McGraw-Hill wave. The Carnival listing does not appear connected to either the Salesforce campaign or the earlier Anodot-Snowflake wave that affected Rockstar Games and others. Carnival’s own statement points to a direct phishing compromise rather than a third-party platform pivot.

ShinyHunters is one of the most prolific financially motivated threat actors currently active, with confirmed prior breaches including Ticketmaster, Santander Bank, the European Commission, and most recently Vercel. The group consistently operates on a data exfiltration and extortion model, gaining initial access through phishing, vishing, or third-party platform compromise before issuing pay-or-leak demands.

If you have received a data breach notification, visit our guide on how to respond.

Picture of m00s3c

m00s3c

Moose (@m00s3c) is the author of BreachNews, focusing on data breach intelligence, dark web monitoring, and threat analysis. His work involves analyzing breach claims, reviewing leaked datasets, and tracking threat actor activity to provide clear, factual reporting.

Related Posts

Newsletter signup

Get the latest data breach and security news.

Please wait...

Thank you for signing up!

Search & Monitoring Tools

Free Data Breach Search Tool

Check your email against 12 billion+ leaked records — then set up alerts so you're the first to know if you appear in a new breach.

Instant breach lookup
Real-time monitoring & alerts
12 billion+ leaked records
Check now Set up monitoring

Powered by BreachNews