
MailChimp, a widely used email marketing platform, has become a prime target for cybercriminals employing sophisticated phishing and social engineering attacks. Recent incidents demonstrate how compromised accounts are being weaponized to steal subscriber lists, impersonate trusted brands, and launch secondary attacks. Attackers are bypassing multi-factor authentication (MFA) by stealing session cookies through infostealer malware like RedLine and Lumma, gaining persistent access to accounts without needing credentials.
Executive Summary for Security Leaders
Three major security incidents between 2022-2025 reveal systemic vulnerabilities in MailChimp’s security posture:
- April 2022: Social engineering attack compromised employee credentials, exposing 319 accounts (102 with data exfiltration)
- January 2023: Repeat attack using similar methods breached 133 accounts, primarily affecting WooCommerce and cryptocurrency clients
- March 2025: Campaign using infostealers (RedLine/Lumma) infected 1,200+ systems across education and e-commerce sectors
Technical Analysis of Attack Vectors
Session Cookie Theft Bypassing MFA
The March 2025 campaign represents an evolution in attack methodology. Instead of targeting credentials, attackers deployed infostealer malware to harvest active session cookies. This technique effectively bypasses MFA protections since the session itself is hijacked. According to GBHackers, the RedLine and Lumma malware families were particularly effective at:
Malware Family | Targeted Data | Geographic Focus |
---|---|---|
RedLine | Browser sessions, saved credentials | Mexico, Australia |
Lumma | Session cookies, API keys | Colombia, Australia |
Brand Impersonation Campaigns
Compromised MailChimp accounts have been used to launch convincing phishing campaigns impersonating trusted brands. The April 2022 breach saw attackers impersonate Trezor, sending fake “security incident” emails that led to cryptocurrency theft. Analysis of these campaigns shows:
“Attackers leveraged MailChimp’s legitimate infrastructure to send emails with DKIM/SPF validation, making detection exceptionally difficult for both users and email filters.” – HC3 Sector Alert
Systemic Security Weaknesses
Recurring breaches suggest fundamental security gaps in MailChimp’s architecture:
Authentication Flaws
The platform’s reliance on OTP-based MFA rather than phishing-resistant methods like FIDO2/passkeys creates vulnerabilities. Session management appears particularly weak, with cookies remaining valid for extended periods.
Supply Chain Risks
API key misuse has enabled mass spoofing, as seen in the Trezor phishing incident. Compromised accounts can access client subscriber lists, creating secondary attack opportunities.
Mitigation Strategies
For Organizations Using MailChimp
Security teams should implement these protective measures:
- Enforce hardware-based MFA (YubiKeys) for all administrative accounts
- Regularly rotate API keys and monitor for credential leaks using services like Have I Been Pwned
- Implement session timeouts and IP-based session validation
For Security Monitoring
Detection rules should focus on:
- Unusual login locations or sudden changes in sending patterns
- Mass exports of subscriber lists or template modifications
- API calls from new IP ranges or unusual geolocations
Conclusion
The MailChimp breaches demonstrate how marketing platforms have become high-value targets for attackers. The shift from credential theft to session hijacking shows adversaries adapting to security controls. Organizations must assume third-party services will be compromised and implement additional verification layers for communications originating from these platforms.
References
- “MailChimp says it was hacked after employee credentials compromised”. TechCrunch. 2022.
- “HC3 Alert on MailChimp Security Incident”. U.S. Department of Health and Human Services. 2022.
- “MailChimp suffers another social engineering attack”. CSHub. 2023.
- “MailChimp Suffers Another Security Breach via Social Engineering Attack”. The Hacker News. 2023.
- “Hackers Exploit MailChimp Email Marketing Platform Using Phishing and Social Engineering Tactics”. GBHackers. 2025.
- “Ongoing phishing attacks on Trezor users”. Trezor Blog. 2022.