Supply chain
⛓ Supply Chain
Mailchimp Social Engineering Breach — 133 Customers Affected Including Trezor, Fanatics, WooCommerce
Primary Source ↗Incident Details
In April 2022, Mailchimp discovered that a malicious actor had conducted a social engineering attack on Mailchimp employees and contractors, gaining access to Mailchimp’s internal admin tool. The attackers used the access to view data from 319 Mailchimp accounts and export audience data from 102 accounts. Affected accounts included crypto-related businesses (Trezor hardware wallet — whose subscriber list was used to send phishing emails to Trezor customers), sports merchandise retailer Fanatics, WooCommerce, and others. The Trezor incident had significant downstream impact: attackers sent phishing emails to Trezor customers claiming a security breach and directing them to a fake Trezor site to enter their seed phrases — a direct attempt to steal cryptocurrency funds. Mailchimp disclosed the breach on 4 April 2022. A second Mailchimp social engineering breach occurred in August 2022, affecting DigitalOcean and others. A third breach occurred in January 2023, affecting 133 accounts. The repeated breaches at Mailchimp highlighted the difficulty of protecting SaaS platforms against social engineering targeting internal support staff who necessarily have access to customer data.
Technical Details
- Initial Attack Vector
- Attackers used social engineering to target Mailchimp customer-facing operations staff, obtaining credentials to access internal tools used by Mailchimp's customer support and account administration teams; the attackers then used this access to view and export customer list data
- Vendor / Product
- Mailchimp email marketing platform (internal admin tools)
- Supply Chain Attack
- ✅ Confirmed third-party / vendor compromise
Timeline
- 2023-01-01 Breach occurred
- 2023-01-01 Publicly disclosed