Mailchimp slips up once more, suffers safety breach after falling on social engineering banana pores and skin • Graham Cluley

Mailchimp slips up again, suffers security breach after falling on social engineering banana skin

For the second time in lower than a yr, e-mail e-newsletter service Mailchimp has discovered itself within the embarrassing place of admitting it has suffered a data breach.

Mailchimp says {that a} social engineering assault succeeded in tricking Mailchimp workers and contractors into handing over their login credentials. These particulars had been then efficiently utilized by a hacker to entry 133 Mailchimp accounts.

Mailchimp says that it contacted all affected account holders on January 12, lower than 24 hours after the safety breach was found.

EmailSignal as much as our e-newsletter
Safety information, recommendation, and suggestions.

A kind of Mailchimp clients who seem to have been affected was WooCommerce, makers of a WordPress plugin that’s widespread with companies working on-line shops.

Woocommerce email
Woocommerce warns its subscribers that Mailchimp has suffered a safety breach

WooCommerce contacted affected customers warning them that a few of their private info had been uncovered:

  • Their identify
  • Their on-line retailer URL
  • Their deal with
  • E-mail deal with

Such info may clearly be exploited by attackers in, as an example, phishing assaults. Little doubt WooCommerce, and different Mailchimp customers, are lower than impressed that their personal clients have been put in danger attributable to Mailchimp’s safety slip-up.

Mailchimp isn’t any stranger to safety breaches.

In March 2022, Mailchimp discovered that an attacker had managed to entry a software utilized by its buyer help staff, accessing 300 shopper accounts and efficiently stealing the subscriber information from 102 of them.

Mailchimp clients who labored within the cryptocurrency and monetary sectors discovered that their accounts had been focused on that event, opening alternatives for scammers to ship out convincing (however malicious) emails to unsuspecting e-newsletter subscribers.

Then, as in the newest safety breach, the attacker used social engineering to dupe Mailchimp employees into handing over their login credentials.

Though Mailchimp seems to have acted comparatively promptly on this occasion, there should absolutely be questions requested as as to whether it’s doing sufficient to lock down entry to its inside instruments, and making certain solely those that are actually authorised are capable of entry them.

Discovered this text fascinating? Follow Graham Cluley on Twitter or Mastodon to learn extra of the unique content material we put up.


Graham Cluley is a veteran of the anti-virus trade having labored for various safety firms because the early Nineteen Nineties when he wrote the primary ever model of Dr Solomon’s Anti-Virus Toolkit for Home windows. Now an impartial safety analyst, he frequently makes media appearances and is a global public speaker on the subject of pc safety, hackers, and on-line privateness.
Observe him on Twitter at @gcluley, on Mastodon at @[email protected], or drop him an e-mail.