MailChimp Breach 2023: Third Breach in Eight Months, Crypto Companies Targeted

8 minute read
2023-01-11
Share Article
BREACH INTELLIGENCE
breach date

2023-01-11

Industry

Technology

Severity

High

Records Exposed

133 customer accounts

Financial Impact

Undisclosed

Breach Summary

The MailChimp breach of January 2023 was the third breach of the email marketing platform in eight months, with an attacker using social engineering against a MailChimp employee to gain access to an internal tool used to support customer accounts — and then using that access to export email lists for cryptocurrency and Web3 companies specifically targeted for downstream phishing campaigns against their subscribers.

What Happened

MailChimp detected the breach on January 11, 2023 and notified affected customers. WooCommerce, FanDuel, Yuga Labs, and Solana Foundation were among the disclosed affected customers. MailChimp noted this was the third breach involving social engineering against their employees in eight months, following breaches in April and August 2022. The January 2023 breach was substantially similar in method to the August 2022 breach. Intuit, MailChimp's parent company, faced significant criticism for the repeated nature of the incidents.

Attack Vector Detail

An attacker social engineered a MailChimp employee through a phishing email that provided access to MailChimp's internal customer support and account administration tool. Using this tool access, the attacker exported audience data from 133 MailChimp customer accounts — specifically targeting accounts associated with cryptocurrency and Web3 companies. The stolen email lists were immediately used to send phishing emails to the subscribers of affected companies impersonating those companies' communications.

Breach Pattern Timeline

January 11, 2023

MailChimp detects unauthorized actor accessing customer support and account administration tools via social engineering against MailChimp employees. Same Scattered Spider / 0ktapus methodology used against Twilio (August 2022).

January 11-13, 2023

Attackers access data of 133 MailChimp customer accounts. Among the affected: WooCommerce, Solana Foundation, FanDuel, Yuga Labs, Statista, and others.

January 15, 2023

MailChimp publicly discloses the incident. Confirms employee credential compromise via social engineering as initial vector.

January 16, 2023

WooCommerce confirms it is among affected MailChimp customers. Customer email and store information potentially exposed for downstream WooCommerce users.

January 17-25, 2023

Additional affected MailChimp customers begin notifying their own users. Attack chain visibility extends multi-tier downstream.

April 2023

Note: This is MailChimp's THIRD social engineering breach in less than a year (prior incidents August 2022 and August 2022 second event). Pattern of recurring social engineering against employee credentials raises industry-wide concerns.

2023-2024

MailChimp implements phishing-resistant MFA, enhanced employee training, restricted internal admin tool access. Class action consolidation in federal court continues. MailChimp + Twilio + Cloudflare attempt establishes social-engineering-against-employee-credentials as the dominant 2022-2024 enterprise breach vector.

Total impact: 133 MailChimp customer accounts breached + downstream impact across WooCommerce/Solana/FanDuel/Yuga Labs ecosystems, third social engineering incident in <12 months for same company, foundational case study for recurring social engineering vulnerability and Scattered Spider methodology persistence.

Executive Lessons

MailChimp's three breaches in eight months established that email marketing platform credentials are high-value targets because they provide direct access to customer communication channels and contact lists across all of the platform's customers. Crypto-focused companies were specifically targeted because access to their MailChimp accounts enabled phishing attacks against their users using trusted sender addresses. Organizations should treat their email marketing platform credentials with the same security rigor as their primary identity infrastructure.

Related Reading

Private Equity Implications

For PE-backed SaaS companies that provide tools with access to customer data, the MailChimp breach illustrates that internal customer support and administration tools are high-value attack targets. These tools typically have broad access to customer data across the entire platform customer base, making a single employee compromise equivalent to a breach affecting all customers whose data the tool can access. Phishing-resistant authentication — hardware security keys or passkeys — for employees with access to customer administration tools should be a baseline security requirement.

How Cloudskope Can Help

Cloudskope's email security and security awareness programs evaluate internal tool access controls, phishing-resistant authentication for customer-facing tools, and security awareness training effectiveness for populations targeted by repeated social engineering campaigns.

Frequently Asked Questions