ELEVATED RISK BREACH

Mailchimp Data Breach


Status: Confirmed

440K+Records
Jul, 2025Breach
8/11/25Data Posted
6/10Severity
ModerateThreat Level

Breach Intelligence Summary


Entity: Mailchimp · Actor: Everest · Source: DataBreach.com / ObscureIQ intelligence

Attack: Ransomware via Network intrusion / ransomware deployment

Timeline: Breach (Jul, 2025) · Reported (Aug, 2025) · Leak (8/11/25)

Exposure: 440K+ records · Email, Phone Number, Home Address

Status: Confirmed · Risk: Moderate (Phishing / SIM swap)

Summary

In late July 2025 the Everest ransomware group added Mailchimp to its leak site alleging it stole 767 MB of data-about 943 536 lines -described as “internal company documents.” Coverage by TechRadar Pro noted Everest posted samples and threatened consequences if the firm didn’t engage while Cybernews reported a live countdown with roughly four days remaining at the time of their piece. Early looks at the sample rows suggested the trove resembled structured business/marketing metadata rather than crown-jewel customer records. As Hackread summarized entries included domain names corporate emails and phone numbers city/country fields GDPR region labels social links hosting providers and tech-stack tags (e.g. Shopify Google Cloud). That profile aligns more with a CRM/export from a tenant than with a breach of Mailchimp’s core infrastructure. Intuit Mailchimp’s parent disputes the claim. In statements reported by Cybernews and MediaPost the company said its investigation found “no evidence to suggest any security incidents or exfiltration of data from our systems.” No breach notifications or regulatory filings have been issued in connection with this episode. The security community’s reaction has been broadly skeptical. TechRadar Pro reported that vx-underground characterized the dataset as “ remarkably small ” for a platform of Mailchimp’s size and it quoted social responses calling the haul “ 300 milliseconds worth of Mailchimp data ”-suggesting it might reflect one customer’s list rather than a platform-wide compromise. Contextually Mailchimp has been reported to serve roughly 14 million active users magnifying the perception that a 767 MB archive is tiny by comparison. See the discussion in TechRadar Pro and background cited by Cybernews . Bottom line (as of August 2025): The Mailchimp incident remains unverified . Everest claims a 767 MB dataset and uses a public countdown to ratchet pressure but Intuit says it has found no evidence of compromise and independent write-ups point to low-sensitivity marketing-like records that could originate from a single tenant or third party. This looks like a classic case of perception-driven extortion -naming a marquee brand to generate headlines and force a reaction even when technical severity is unclear. Frequently Asked Questions – Mailchimp 2025 Suspected Breach Was the Mailchimp 2025 breach confirmed? No. Intuit , Mailchimp’s parent company has publicly stated that its security teams found no evidence of a data breach or system compromise. The company has not issued any breach notifications or regulatory filings tied to this claim. Who claimed responsibility for the incident? The ransomware and extortion group known as Everest claimed responsibility adding Mailchimp to its leak site and alleging it had exfiltrated 767 MB of “internal company documents.” What data was allegedly stolen? According to descriptions on the leak site and reporting by Hackread , the data appeared to include domain names corporate contact information geographic metadata GDPR region tags social media links and technology stack identifiers. This suggests it may have been a marketing or CRM dataset rather than sensitive customer account data. How did the cybersecurity community react? Industry reaction as noted by TechRadar Pro was largely dismissive. Experts joked about the small size of the dataset and questioned whether it truly originated from Mailchimp’s core systems. Why is this incident still important? , Even unverified claims can cause reputational harm customer anxiety and operational distraction. As Cybernews observed ransomware groups increasingly leverage perception-driven extortion , using public allegations to apply pressure even when the technical severity is low.

About Mailchimp

Mailchimp is the organization affected by this breach. User data may have been generated through account creation, service usage, or business operations.

If you have interacted with Mailchimp in any capacity, your data may be included in this breach.

Threat Actor: Everest

This breach has been attributed to Everest. The group is known for data theft campaigns targeting organizations through various intrusion methods.

Reported or suspected access method:
  • Network intrusion / ransomware deployment

Breach Exploitation Status

Threat Activity:
Moderate
Signal
Status
Dark web marketplace listings
Detected
Credential stuffing list overlap
Possible
Phishing campaign relevance
Possible
Ransomware affiliate crossover
Unknown
Law enforcement investigation visibility
Unknown

Data Longevity:
3–5 years

Phone numbers and addresses change over time but remain valid long enough for sustained exploitation campaigns.

Data Points Exposed

Data observed in the leaked dataset:
Email
Phone Number
Home Address
Not confirmed in dataset:
Passwords (plaintext)
Social Security Numbers
Payment card data

Dark Web Verification

Status: Confirmed

  • Dataset containing approximately 440K+ records has been identified in breach intelligence sources.
  • The data is indexed and searchable across breach notification platforms.

Impact

This breach carries moderate risk due to the nature of exposed data fields and the scale of affected records.

Primary downstream threats include:
  • Targeted phishing referencing Mailchimp accounts or services
  • SIM-swap attempts where phone numbers are present
  • Physical mail scams and address-based identity verification fraud
  • Data broker enrichment and resale

Recommendations for Impacted Individuals

If you believe your information may be included:

Check Your Exposure
If you are an ObscureIQ client, this breach has been indexed into your exposure profile.
Non-clients may request a breach impact review.
Expect Targeted Phishing
Watch for messages referencing:
Mailchimp account updates
Password reset requests
Verify directly through official channels.
Secure Your Email and MFA
Enable MFA immediately on email first, then financial platforms.
Email compromise is often the first pivot point.
Rotate Reused Passwords
Change any credentials shared with your Mailchimp account across other services.
Monitor Financial Accounts
Monitor accounts associated with your exposed email for unauthorized activity.
Suppress Personal Data
Remove exposed addresses, phone numbers, and enrichment data from broker networks and search engines.

Frequently Asked Questions

What happened in the Mailchimp data breach?

In Jul, 2025, Mailchimp experienced a data breach that resulted in the exposure of approximately 440K+ records containing personal information.

What data was exposed in the Mailchimp breach?

The exposed data includes Email, Phone Number, Home Address.

How many records were affected in the Mailchimp breach?

Approximately 440K+ records were affected based on current breach intelligence.

Is the Mailchimp breach confirmed?

Yes. This breach is treated as confirmed based on data observed in breach intelligence platforms.

Is the Mailchimp breach data being used by criminals?

Data circulation has been detected across breach-sharing channels. Downstream exploitation risk exists based on the nature of the exposed fields.

What should I do if I was affected by the Mailchimp breach?

Rotate passwords associated with Mailchimp, enable multi-factor authentication on email and financial accounts, and monitor for suspicious activity.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed. Free forever.

High-Risk? Get an Exposure Audit

Executives, public figures, and high-net-worth individuals face elevated risk. Our team provides full-spectrum exposure audits and threat monitoring.

Request Consultation

Corporate Accountability

Organizations that collect personal data have a duty to implement reasonable safeguards and to notify affected individuals when breaches occur.

Scope assessments may evolve as investigations continue. Users should not rely solely on early estimates when making risk decisions.

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of Mailchimp
  • Or simply concerned about credential reuse

We can confirm whether your information is circulating and evaluate downstream threat vectors.

Services
AuditsWipesThreat MonitoringTraining

Classification Tags

Ransomware
Email
Phone
Address