In an interview with Dutch quality newspaper (
link behind paywall) the hackers explained that the hack was easy because "ODIDO did not apply
the principle of least privilege"
That claim is plausible in a general security sense, but it should still be treated cautiously because it comes from the attackers themselves.
What “least privilege” means
The principle of least privilege means users, systems, applications, and service accounts should only have the minimum access needed to do their job.
In practice, that usually means:
- Staff accounts should not have access to large amounts of customer data unless required
- Administrative rights should be tightly limited
- Internal systems should be segmented so one compromised account cannot reach everything
- Access should be time-limited, role-based, and regularly reviewed
- Sensitive data such as identity documents should have stronger access controls than routine account data
Why attackers mention it
If a breach becomes much worse after one account or one entry point is compromised, weak privilege separation is often part of the problem.
For example, if an attacker gets into:
- a support account and can immediately view full identity records
- an internal application that exposes more data than that role should need
- a service account with broad database permissions
then poor access control or excessive permissions may indeed have contributed.
Important limitation
It is not possible to confirm the exact cause safely just from the attackers’ statement or a news interview.
Attackers may:
- tell the truth
- oversimplify what happened
- exaggerate their skill
- shape the story for publicity or leverage
So the statement should be seen as an allegation unless Odido, regulators, forensic investigators, or credible technical reporting confirms it.
What it likely implies if accurate
If the claim is accurate, it would usually suggest one or more of these issues:
- over-permissioned employee or contractor accounts
- weak role-based access control
- poor segregation between customer support systems and highly sensitive identity data
- insufficient network or application segmentation
- service accounts with unnecessary database access
- inadequate monitoring of unusual bulk access
Bottom line
“Yes, that could absolutely make a breach easier and more damaging,” but “the hackers said so” is not enough on its own to treat it as established fact. The safer conclusion is that least-privilege failures are a credible explanation, not yet a confirmed one unless supported by official investigation findings.