Mailchimp Data Breach
Status: Confirmed
Breach Intelligence Summary
Entity: Mailchimp · Actor: Everest · Source: DataBreach.com / ObscureIQ intelligence
Attack: Ransomware via Network intrusion / ransomware deployment
Timeline: Breach (Jul, 2025) · Reported (Aug, 2025) · Leak (8/11/25)
Exposure: 440K+ records · Email, Phone Number, Home Address
Status: Confirmed · Risk: Moderate (Phishing / SIM swap)
Summary
In late July 2025 the Everest ransomware group added Mailchimp to its leak site alleging it stole 767 MB of data-about 943 536 lines -described as “internal company documents.” Coverage by TechRadar Pro noted Everest posted samples and threatened consequences if the firm didn’t engage while Cybernews reported a live countdown with roughly four days remaining at the time of their piece. Early looks at the sample rows suggested the trove resembled structured business/marketing metadata rather than crown-jewel customer records. As Hackread summarized entries included domain names corporate emails and phone numbers city/country fields GDPR region labels social links hosting providers and tech-stack tags (e.g. Shopify Google Cloud). That profile aligns more with a CRM/export from a tenant than with a breach of Mailchimp’s core infrastructure. Intuit Mailchimp’s parent disputes the claim. In statements reported by Cybernews and MediaPost the company said its investigation found “no evidence to suggest any security incidents or exfiltration of data from our systems.” No breach notifications or regulatory filings have been issued in connection with this episode. The security community’s reaction has been broadly skeptical. TechRadar Pro reported that vx-underground characterized the dataset as “ remarkably small ” for a platform of Mailchimp’s size and it quoted social responses calling the haul “ 300 milliseconds worth of Mailchimp data ”-suggesting it might reflect one customer’s list rather than a platform-wide compromise. Contextually Mailchimp has been reported to serve roughly 14 million active users magnifying the perception that a 767 MB archive is tiny by comparison. See the discussion in TechRadar Pro and background cited by Cybernews . Bottom line (as of August 2025): The Mailchimp incident remains unverified . Everest claims a 767 MB dataset and uses a public countdown to ratchet pressure but Intuit says it has found no evidence of compromise and independent write-ups point to low-sensitivity marketing-like records that could originate from a single tenant or third party. This looks like a classic case of perception-driven extortion -naming a marquee brand to generate headlines and force a reaction even when technical severity is unclear. Frequently Asked Questions – Mailchimp 2025 Suspected Breach Was the Mailchimp 2025 breach confirmed? No. Intuit , Mailchimp’s parent company has publicly stated that its security teams found no evidence of a data breach or system compromise. The company has not issued any breach notifications or regulatory filings tied to this claim. Who claimed responsibility for the incident? The ransomware and extortion group known as Everest claimed responsibility adding Mailchimp to its leak site and alleging it had exfiltrated 767 MB of “internal company documents.” What data was allegedly stolen? According to descriptions on the leak site and reporting by Hackread , the data appeared to include domain names corporate contact information geographic metadata GDPR region tags social media links and technology stack identifiers. This suggests it may have been a marketing or CRM dataset rather than sensitive customer account data. How did the cybersecurity community react? Industry reaction as noted by TechRadar Pro was largely dismissive. Experts joked about the small size of the dataset and questioned whether it truly originated from Mailchimp’s core systems. Why is this incident still important? , Even unverified claims can cause reputational harm customer anxiety and operational distraction. As Cybernews observed ransomware groups increasingly leverage perception-driven extortion , using public allegations to apply pressure even when the technical severity is low.
About Mailchimp
Mailchimp is the organization affected by this breach. User data may have been generated through account creation, service usage, or business operations.
If you have interacted with Mailchimp in any capacity, your data may be included in this breach.
Threat Actor: Everest
This breach has been attributed to Everest. The group is known for data theft campaigns targeting organizations through various intrusion methods.
- Network intrusion / ransomware deployment
Breach Exploitation Status
Moderate
Status
Detected
Possible
Possible
Unknown
Unknown
3–5 years
Phone numbers and addresses change over time but remain valid long enough for sustained exploitation campaigns.
Data Points Exposed
Dark Web Verification
Status: Confirmed
- Dataset containing approximately 440K+ records has been identified in breach intelligence sources.
- The data is indexed and searchable across breach notification platforms.
Impact
This breach carries moderate risk due to the nature of exposed data fields and the scale of affected records.
- Targeted phishing referencing Mailchimp accounts or services
- SIM-swap attempts where phone numbers are present
- Physical mail scams and address-based identity verification fraud
- Data broker enrichment and resale
Recommendations for Impacted Individuals
If you believe your information may be included:
Non-clients may request a breach impact review.
Mailchimp account updates
Password reset requests
Verify directly through official channels.
Email compromise is often the first pivot point.
Frequently Asked Questions
In Jul, 2025, Mailchimp experienced a data breach that resulted in the exposure of approximately 440K+ records containing personal information.
The exposed data includes Email, Phone Number, Home Address.
Approximately 440K+ records were affected based on current breach intelligence.
Yes. This breach is treated as confirmed based on data observed in breach intelligence platforms.
Data circulation has been detected across breach-sharing channels. Downstream exploitation risk exists based on the nature of the exposed fields.
Rotate passwords associated with Mailchimp, enable multi-factor authentication on email and financial accounts, and monitor for suspicious activity.
Protect Yourself
Check If You’re Affected
Enter your email to check if your data appears in this breach.
Get Free Breach Alerts
Be the first to know when new breaches are disclosed. Free forever.
High-Risk? Get an Exposure Audit
Executives, public figures, and high-net-worth individuals face elevated risk. Our team provides full-spectrum exposure audits and threat monitoring.
Corporate Accountability
Organizations that collect personal data have a duty to implement reasonable safeguards and to notify affected individuals when breaches occur.
Scope assessments may evolve as investigations continue. Users should not rely solely on early estimates when making risk decisions.
ObscureIQ Advisory
We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.
- A public-facing individual
- A high-profile executive
- A customer of Mailchimp
- Or simply concerned about credential reuse
We can confirm whether your information is circulating and evaluate downstream threat vectors.
