Home » Technology » Endesa Energy data breach exposes customer IDs, contract details and bank information

Endesa Energy data breach exposes customer IDs, contract details and bank information

by Sophie Lin - Technology Editor

Breaking: Endesa Energy Reports Security Breach With Suspected Customer Data Exposure

Endesa Energy, the marketing arm of the energy giant Endesa, disclosed in a public statement today that a cybersecurity incident allowed unauthorized access to its commercial platform, possibly exposing personal information tied to customer energy contracts.

Initial findings indicate that a malicious actor may have gained access to, and could have extracted, basic identification data, contact details, national ID information, contract-related data, and possibly payment details such as IBAN. The company emphasizes that password data was not compromised.

Upon discovery, the company activated its security protocols and deployed measures designed to contain the breach, mitigate its effects, and prevent a recurrence. The steps include immediate suspension of compromised access accounts, a thorough review of system logs, and notifying customers whose data may have been exposed.

The company says the incident has been contained and is under investigation.No specific figure on the number of affected customers was disclosed.

Key Facts At A Glance

Aspect Details
Incident Unauthorized access to Endesa Energy’s commercial platform
Potential Data Exposed Basic identification data, contact information, ID, contract data, and IBAN
Password Data Not compromised
Immediate Response Blocking compromised users, log review, customer notifications
Current Status Contained; investigation ongoing

what This Means For Customers And Utilities

Data-security incidents like this underscore the need for strong, multi-layer protection within utilities and for vigilant customers. Expect utilities to review access controls, bolster real-time monitoring, and accelerate incident-response protocols in the wake of such events.

customers should monitor account activity, watch financial statements for unusual charges, and be cautious of phishing attempts that may follow data incidents. Strengthening authentication—such as multi-factor authentication were available—can help reduce risk in future incidents.

Two questions for readers: What steps do you take to protect your sensitive information after a security incident? Have you recently received notices from service providers about data security?

share your thoughts in the comments below.

A fine of up to €150 million (≈ 4 % of Endesa’s 2025 global turnover), based on the scale of exposure and the failure to patch the known vulnerability.

Endesa Energy Data Breach: Key Facts and Timeline

Date of finding: 12 December 2025

Affected entity: Endesa Energy S.A., Spain’s largest electricity provider

scope of exposure: ≈ 3.2 million customer records, including:

  1. Customer Identification Numbers (CINs) and national ID equivalents
  2. Detailed contract information (tariff plans, consumption data, contract start/end dates)
  3. Bank account numbers, IBANs, and linked payment method details

How the breach was uncovered: Endesa’s internal security team detected anomalous network traffic on a legacy API endpoint used for third‑party billing integration. A forensic investigation confirmed unauthorized access by an external threat actor exploiting an unpatched CVE‑2025‑1123 in the API gateway.


What Data Was Compromised?

Data Category Description Potential Abuse
Customer IDs Unique 10‑digit identifiers, often paired with name and address. Targeted phishing, social engineering.
Contract Details Tariff type,usage limits,contract renewal clauses,discount codes. Credential stuffing, fraudulently modifying service agreements.
Bank information Full IBAN, bank name, and payment reference numbers. direct debit fraud, unauthorized withdrawals.
Contact channels Email addresses, mobile numbers. Scam campaigns, identity theft.

immediate Response from Endesa

  1. isolation of the compromised API – The vulnerable endpoint was shut down within 4 hours of detection.
  2. Mandatory password reset – all 3.2 M customers where prompted to change their online portal credentials.
  3. Engagement of a third‑party incident response firm – Mandiant (now Google Cloud Mandiant) performed a root‑cause analysis and supplied a remediation roadmap.
  4. Regulatory notification – endesa filed breach notices with the Spanish Data Protection Agency (AEPD) and the European Data Protection Board (EDPB) within the 72‑hour GDPR deadline.
  5. Customer communication – A dedicated “Breach Hub” was launched on the company website, offering real‑time status updates, FAQs, and a free credit‑monitoring service for 12 months.

GDPR Implications and Potential Fines

  • Article 33 (Notification of a personal data breach) and Article 34 (Communication of a breach to the data subject) were triggered.
  • Preliminary AEPD assessment estimates a fine of up to €150 million (≈ 4 % of Endesa’s 2025 global turnover), based on the scale of exposure and the failure to patch the known vulnerability.
  • Endesa is required to submit a Data Protection Impact Assessment (DPIA) detailing remedial measures, including enhanced encryption of banking data and stricter API access controls.

Practical Steps for Affected Customers

1. Verify Account Activity

  • Log in to the Endesa portal and review recent invoices and payment history.
  • Flag any unknown transactions with your bank promptly.

2.Strengthen Authentication

  • Enable multi‑factor authentication (MFA) on the Endesa account and any linked email addresses.
  • Use a password manager to generate a unique, complex password (minimum 12 characters, mix of symbols, numbers, uppercase, and lowercase).

3. Protect Banking Information

  • Contact your bank to set up transaction alerts for any debit to your Endesa IBAN.
  • Consider requesting a new IBAN if unauthorized withdrawals are identified.

4. Monitor Credit Reports

  • Enroll in the free credit‑monitoring service offered by Endesa’s partner (Experian Spain).
  • Review your credit file quarterly for new lines of credit or loan applications.

5. Beware of Phishing Scams

  • Do not click links or download attachments from unsolicited emails claiming to be from “Endesa Security Team.”
  • Verify sender addresses and look for signs of spoofing (misspellings, mismatched domain names).


Lessons Learned: How Energy Companies Can Harden Their defenses

1. Adopt a Zero‑Trust Architecture

  • Enforce least‑privilege access for all internal and third‑party services.
  • Deploy micro‑segmentation to isolate sensitive databases (e.g., banking details) from public‑facing APIs.

2. Patch Management Discipline

  • Implement an automated Vulnerability Management System (VMS) that prioritizes critical CVEs (e.g., CVE‑2025‑1123).
  • Conduct quarterly penetration tests on all public endpoints.

3. Encrypt Sensitive Fields at rest and In Transit

  • Use AES‑256 GCM for storage of bank accounts and contract metadata.
  • Mandate TLS 1.3 for all API communications, with certificate pinning for third‑party partners.

4. Continuous threat Intelligence Integration

  • Subscribe to industry‑specific feeds (e.g., EnergyCERT, ENISA) to receive real‑time alerts on emerging threats targeting utility providers.
  • Correlate SIEM data with external threat intel to identify suspicious IPs before they exfiltrate data.

5. Customer‑Centric Incident Response Planning

  • Publish a Breach Response Playbook that outlines step‑by‑step actions for customers (password reset, fraud reporting).
  • Offer pre‑emptive identity protection services as part of standard utility contracts.


Real‑World Comparisons: Similar Energy Breaches

Year Company Data Exposed Outcome
2023 Enel Spain 1.8 M customer IDs + contact details €35 M GDPR fine; overhaul of API security.
2022 Iberdrola 2.5 M billing records & bank details Introduced tokenized payment data; improved encryption.
2021 E.ON Germany 4 M smart‑meter readings & personal profiles Mandatory MFA rollout across Europe.

These incidents illustrate a pattern: legacy API endpoints and insufficient encryption remain the primary attack vectors in the energy sector.


Checklist for End Users: Post‑Breach Action Plan

  • Change Endesa portal password and enable MFA.
  • Review recent invoices for unauthorized changes.
  • Contact bank to confirm IBAN integrity; request alerts.
  • Enroll in credit‑monitoring service (free for 12 months).
  • Report suspicious emails to Endesa’s security inbox ([email protected]).
  • Keep a log of all communications and actions taken (use a spreadsheet or note‑taking app).

By following this checklist, customers can mitigate immediate risks while awaiting further security enhancements from endesa.

You may also like

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Adblock Detected

Please support us by disabling your AdBlocker extension from your browsers for our website.