Panera Bread Breach: 5.1M Accounts Exposed
In January 2026, Panera Bread suffered a data breach that exposed 14M records . After an attempted extortion failed, the attackers published the data publicly, which included 5.1M unique email addresses along with associated account information such as names, phone numbers and physical addresses. Pa...
Overview
On January 15, 2026, Panera Bread confirmed a data breach affecting 5,112,502 customer accounts. The breach initially exposed approximately 14 million records. After an extortion attempt failed, the attackers published the stolen data publicly. The exposed information includes email addresses, names, phone numbers, and physical addresses. This incident has been reported to Have I Been Pwned (HIBP), allowing affected customers to check their exposure status.
What Was Exposed
The attackers obtained a combination of personally identifiable information (PII), including:
- Email addresses – used for account login and communication
- Names – full names associated with accounts
- Phone numbers – personal and potentially mobile numbers
- Physical addresses – street addresses tied to account profiles
While no payment card numbers or social security numbers were confirmed exposed, the combination of these data points is highly valuable to cybercriminals for targeted phishing, identity fraud, and social engineering attacks.
How the Breach Happened
According to the breach notification, the attackers gained unauthorized access to Panera Bread’s systems, exfiltrated a database of customer records, and then attempted to extort the company for payment. When Panera Bread declined to pay, the attackers released the full dataset publicly. The exact attack vector (e.g., SQL injection, compromised credentials, or misconfigured database) has not been disclosed by Panera.
Identity Theft and Phishing Risks
With names, emails, phone numbers, and home addresses, victims face elevated risks for:
- Spear-phishing campaigns – attackers can craft convincing emails or text messages referencing Panera orders or accounts
- SIM-swapping – phone numbers can be used to initiate carrier port-out attacks if linked to other accounts
- Physical mail fraud – home addresses enable targeted mail-based scams or identity theft attempts
- Credential stuffing – email addresses combined with reused passwords can compromise other online accounts
How to Check If You’re Affected
You can verify if your Panera account was compromised by using the Have I Been Pwned (HIBP) breach checker. Visit haveibeenpwned.com and enter the email address you used for your Panera Bread account. The Panera Bread breach (dated January 2026) is listed in the HIBP database.
What to Do Right Now
- Change your Panera password immediately – use a strong, unique password that you do not reuse elsewhere
- Enable two-factor authentication on your Panera account and any other accounts that support it
- Monitor for phishing attempts – be wary of unsolicited emails, texts, or calls claiming to be from Panera or related services
- Check for unusual activity on accounts linked to your email, phone number, or address
- Consider freezing your credit if you have not already done so, especially if you suspect identity theft
Security Insight
This breach demonstrates a dangerous pattern: even when companies refuse to pay extortion demands, the data is still weaponized. Panera Bread’s failure to stop the initial exfiltration suggests weak access controls or insufficient monitoring of database queries. For a company serving millions of customers, this was a preventable incident that has now exposed sensitive customer data to the public. Similar breaches in the food service industry, such as the 2024 Chick-fil-A credential stuffing incident, highlight a broader trend of insufficient customer data protections among restaurant chains. For ongoing updates on data breaches, follow our cybersecurity news.
Further Reading
Investigate Breaches Safely with NordVPN
Researching exposed data, paste sites, or threat actor infrastructure? Route your OSINT traffic through a VPN to avoid attribution and keep your investigation IP separate from your corporate network.
Get NordVPN for ResearchAffiliate link — we may earn a commission at no extra cost to you.
Never miss a data breach report
Get real-time security alerts delivered to your preferred platform.
Related Breach Reports
In April 2026, Canada Life was the victim of a "pay or leak" extortion campaign by the ShinyHunters group . The group subsequently published the data which contained over 200k unique email addresses along with names, phone numbers, physical addresses and, in some cases, customer support tickets. In ...
In March 2026, the AI-driven merchant data platform Woflow was named as a victim by the ShinyHunters data extortion group . The group subsequently published tens of thousands of files allegedly obtained from the company, comprising more than 2TB of data. The trove included hundreds of thousands of e...
In April 2026, the ultra-luxury hotel brand Aman was named by ShinyHunters as the target of a "pay or leak" extortion campaign , with the data allegedly obtained from their Salesforce CRM. The data was subsequently leaked publicly and contained over 200k unique email addresses. Whilst not present on...
In April 2026, the hacking collective ShinyHunters claimed to have obtained data from Pitney Bowes as part of a broader extortion campaign that also named several other organisations. After negotiations allegedly failed, the group publicly released the data which included 8.2M unique email addresses...