FAQsFAQs
  • Business
  • Education
  • Entertainment
  • Health
    • Food and Nutrition
  • Lifestyle
    • Career
    • Electronics
    • Money
    • Personalities
    • Shopping
  • Science & Technology
  • Sports
  • World
    • News
    • Travel
  • Shop
0

No products in the cart.

Font ResizerAa
Font ResizerAa
FAQsFAQs
  • Business
  • Education
  • Entertainment
  • Health
    • Food and Nutrition
  • Lifestyle
    • Career
    • Electronics
    • Money
    • Personalities
    • Shopping
  • Science & Technology
  • Sports
  • World
    • News
    • Travel
  • Shop
Follow US
@ 2023. FAQs. Best Knowledge based website in Pakistan.
FAQs > Cyber Security > Unauthorized Breach of Mailchimp
Cyber Security

Unauthorized Breach of Mailchimp

admin
Last updated: December 26, 2024 11:39 pm
admin
Share
4 Min Read
Unauthorized Breach of Mailchimp

Mailchimp, one of the leading email marketing companies, announced that it was the target of a unauthorized security breach on January 12, 2023. It said that hackers had used an internal tool to access several customer accounts. In addition, Mailchimp stated that an attacker had also gained access to an internal customer support tool. They claimed that this attack was a result of phishing attacks, but the company did not offer any specific details about the types of attacks that used to compromise the accounts.

Contents
Digital OceanTrezor

The attackers accessed the accounts of at least 102 users. These accounts used to generate mailing lists that then used to launch phishing campaigns. Researchers also accessed user data, billing addresses, shipping addresses, and full names. This used to launch the phishing campaign, which targeted cryptocurrencies.

Digital Ocean

Digital Ocean, which migrated its email service from Mailchimp, warned its customers of the security breach. While the exact number of customers affected is not known, it said that only a small number of them targeted. However, the company said that the affected users notified and their accounts secured.

Crypto industry executives said that they were surprised to hear about the incident. As crypto-related businesses like Mailchimp, Gemini, and Uber use the platform to send transactional emails, it is possible that the attackers were able to extract information such as credit card numbers and other financial information. According to analysts, the security breach is likely part of a larger security event that occurred. Some believe that the hackers used a malicious application that allowed them to transfer funds.

Email service providers such as Mailchimp are vulnerable to attack by malware and phishing attacks. It has observed that the phishing campaign executed with exceptional sophistication. One of the techniques used was to use an unauthorized user account to send fake data breach notification emails. This could have allowed the attacker to manipulate promotional codes, fetch customer information, or launch rogue emails.

In other cases, the attackers gained access to the accounts of trusted users. This is why Mailchimp advises its contacts to be extra vigilant when receiving suspicious emails. Additionally, the company recommends enabling two-factor authentication. When Mailchimp disabled the employee account, the CISO took steps to prevent the unauthorized account from used again.

Trezor

Another company that compromised by the Mailchimp security incident was Trezor. A fake desktop application developed to steal a seed phrase that would allow the attacker to gain complete control over the wallet. Once the seed phrase entered, the app directed the user to a phishing website. By clicking on the link in the email, the customer prompted to enter their Trezor hardware wallet PIN. That, in turn, led to the download of a malicious code.

In December of 2022, Gemini experienced similar incidents. The attackers had access to 5.7 million Gemini customer email addresses. Their phishing kit was responsible for thousands of attacks against 136 high-profile organizations.

Recommended readings:

  • Capital One Phishing Attack
  • Diversify Your Sources of Truth After the Okta Breaches
Share This Article
Facebook X Pinterest Whatsapp Whatsapp LinkedIn Tumblr Reddit Email Copy Link Print
What do you think?
Love0
Happy0
Surprise0
Sad0
Sleepy0
Angry0
Dead0
Wink0
admin
By admin
Follow:
A team lead of enthusiast and passionate members who love to write high quality content. My aim is to serve the internet community in Pakistan and specially students, learners and professionals to find the relevant information easily.
Advantages of Having Clear Span Metal Buildings
Advantages of Having Clear Span Metal Buildings
Science and Technology
Delete Or Deactivate snapchat Account
How to Delete or Deactivate a Snapchat Account
Technology Guides
Highest Run Chase by Pakistan Against India and Sri Lanka at the National Stadium Karachi
Highest Run Chase by Pakistan Against India and Sri Lanka at the National Stadium Karachi
Sports
Borderline Personality Disorder
Borderline Personality Disorder
Health
Terracotta Pottery and Throw Pillows
World
The Culture of Sindh
World
Best Medical Spas in Scottsdale
The Ultimate Guide to the Best Medical Spas in Scottsdale
Health
What is Network Topology?
Science and Technology
What is a Wave?
Science and Technology
Bloke Meaning - What Does Bloke Mean?
Bloke Meaning – What Does Bloke Mean?
Education

You Might Also Like

Unofficial Android App Store APKPure Infected With Malware
Cyber Security

Unofficial Android App Store APKPure Infected With Malware

December 26, 2024
Shopify Plus Stores Can Easily Add Passwordless Login With Passkeys Support
Cyber SecurityNews

Shopify Plus Stores Can Easily Add Passwordless Login With Passkeys Support

December 26, 2024

5 Years After the Equifax Breach, Identity Theft Industry Experts Share New Insights

December 26, 2024
What is a Metaphor
Cyber Security

Capital One Breach Conviction Exposes Scale of Cloud Entitlement Risk

December 26, 2024
What Is Literature Review
Cyber SecurityNewsSports

Rockstar Games Confirms Grand Theft Auto 6 Breach

December 26, 2024
Critical Cisco SMB Router Bug - Authentication Bypass POC Available
Cyber SecurityNews

Critical Cisco SMB Router Bug – Authentication Bypass POC Available

December 26, 2024

Kronos Ransomware Attacks

December 26, 2024

Diversify Your Sources of Truth After the Okta Breaches

December 26, 2024

Knowledge Base Website Pakistan

The Best Knowledge Base Website in Pakistan. Our site has a lot of content that you're bound to find useful. For the discerning student, we also offer a library of short instructional video with each answer. With all of this to choose from, it's no wonder we have the highest quality unique content of any knowledge based website in Pakistan. FAQs Pakistan is the top blogs website. We provide a detail and comprehensive unique articles to help people get latest information on almost every topic in the world. Write us info@faqs.com.pk

@ 2024. Pakistan best Knowledge based website.
adbanner
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?