ManoMano Breach: 38 Million Customers Exposed After Third-Party Customer Service Provider Hacked

European Retailer ManoMano Suffers Massive Data Breach Affecting 38 Million Customers Through Compromised Subcontractor

HIGH
February 28, 2026
6m read
Data BreachSupply Chain AttackThreat Actor

Impact Scope

People Affected

38 million

Industries Affected

RetailTechnology

Geographic Impact

FranceGermanyItalySpainUnited Kingdom (regional)

Related Entities

Threat Actors

Indra

Organizations

Products & Tech

Other

Full Report

Executive Summary

In a significant supply chain attack, European e-commerce retailer ManoMano has confirmed a data breach affecting approximately 38 million customers. The incident originated from the compromise of a third-party customer support subcontractor in January 2026. A threat actor using the alias Indra claims to have exfiltrated 43GB of customer data, including full names, email addresses, phone numbers, and the content of support communications. While financial data and passwords were not exposed, the stolen personal information presents a substantial risk of sophisticated phishing and social engineering attacks against the affected individuals across ManoMano's five European markets. ManoMano has notified regulatory bodies, including France's CNIL, and is implementing remediation measures.


Threat Overview

The breach was first brought to public attention when a threat actor named Indra posted on a dark web forum claiming responsibility. The actor stated they had exfiltrated 43GB of data from ManoMano by compromising a customer support service provider located in Tunisia. The attack vector appears to be a compromised Zendesk account used by the subcontractor, highlighting a critical failure in third-party access security. The exposed data covers ManoMano's entire European customer base, spanning France, Germany, Italy, Spain, and the United Kingdom.

ManoMano, a major retailer with over 50 million unique monthly visitors, confirmed the breach's third-party origin. The company stressed that its internal servers remained secure and that no financial details or account passwords were part of the compromised dataset. The primary threat now lies in the hands of the attackers, who possess a rich dataset of Personally Identifiable Information (PII) and private customer service conversations, which can be weaponized for highly targeted and convincing fraud attempts.

Technical Analysis

The attack exemplifies a classic supply chain compromise, where attackers target a weaker link in an organization's ecosystem to gain access to valuable data. The threat actor Indra likely identified and exploited a vulnerability or weak credentials associated with the subcontractor's access to ManoMano's customer support platform.

Attack Chain & TTPs

  1. Initial Access (T1199 - Trusted Relationship): The core of this attack was the exploitation of the trusted relationship between ManoMano and its customer service subcontractor. The attacker did not need to breach ManoMano's perimeter directly.
  2. Compromise Infrastructure (T1584 - Compromise Infrastructure): The threat actor compromised the infrastructure of the third-party vendor, possibly through phishing, credential stuffing, or exploiting an unpatched vulnerability in the vendor's systems.
  3. Valid Accounts: Cloud Accounts (T1078.004 - Cloud Accounts): The claim of a compromised Zendesk account suggests the attacker gained access using legitimate, albeit stolen, credentials.
  4. Data from Cloud Storage (T1530 - Data from Cloud Storage): Once inside the customer support platform, the attacker exfiltrated sensitive customer data, including PII and conversation logs.
  5. Exfiltration Over C2 Channel (T1041 - Exfiltration Over C2 Channel): The 43GB of data was exfiltrated to attacker-controlled infrastructure.

This incident is a stark reminder that an organization's security posture is only as strong as its weakest third-party vendor. The stolen data, particularly the content of customer service communications, provides attackers with unique context to craft highly believable social engineering campaigns.

Impact Assessment

The business impact for ManoMano is multi-faceted, extending beyond immediate financial costs. The breach affects 38 million individuals, exposing them to significant personal risk from phishing, identity theft, and fraud. For ManoMano, the repercussions include:

  • Reputational Damage: Trust is a critical asset for an e-commerce platform. This breach, regardless of its third-party origin, damages customer confidence.
  • Regulatory Scrutiny: As a European company, ManoMano falls under the jurisdiction of GDPR. The notification to CNIL and other data protection authorities will trigger investigations that could result in substantial fines (up to 4% of annual global turnover).
  • Operational Disruption: ManoMano had to disable the subcontractor's access, forcing them to find alternative customer support solutions, which could impact service quality and increase operational costs.
  • Incident Response Costs: The costs associated with investigating the breach, notifying customers, and implementing enhanced security measures will be significant.

Detection & Response

Organizations must extend their monitoring capabilities to third-party interactions and cloud service usage.

Detection Strategies

  • Cloud Service Monitoring: Monitor logs from SaaS platforms like Zendesk for anomalous activity. Look for logins from unusual geographic locations, impossible travel scenarios, or unusually large data access/export activities from a single account. This can be achieved with a Cloud Access Security Broker (CASB) or native platform logging.
  • Third-Party Access Auditing: Regularly audit and review access patterns of all third-party accounts. Establish a baseline for normal activity and alert on deviations. D3FEND's D3-RAPA: Resource Access Pattern Analysis is a key defensive technique here.
  • Data Loss Prevention (DLP): Implement DLP solutions to monitor and block large-scale exfiltration of data matching predefined patterns for PII.

Response Actions Taken

  • ManoMano disabled the subcontractor's access to customer data.
  • The company initiated a review and strengthening of access control policies.
  • Notifications were sent to relevant data protection authorities (CNIL, ANSSI).
  • Guidance was issued to customers, warning them of potential phishing attacks.

Mitigation

Preventing supply chain attacks requires a robust Third-Party Risk Management (TPRM) program.

Strategic Recommendations

  • Vendor Security Assessments (M0939 - Third-party Software/Component Review): Conduct rigorous security assessments of all vendors before granting them access to sensitive data. This should include reviewing their security policies, certifications, and incident response plans.
  • Principle of Least Privilege (M1026 - Privileged Account Management): Ensure third-party accounts have the absolute minimum level of access required to perform their duties. Data access should be scoped and time-bound wherever possible.
  • Mandate MFA for All Partners (M1032 - Multi-factor Authentication): Enforce the use of strong, phishing-resistant multi-factor authentication for all third-party access to internal or cloud-based systems.
  • Data Minimization: Do not allow third parties to access or store more data than is absolutely necessary. In this case, assess if the full history of customer communications was required for the subcontractor's function.
  • Contractual Obligations (M0951 - Vendor Configuration/Patching Guidance): Implement strong contractual agreements that legally require vendors to adhere to your security standards, report incidents promptly, and submit to regular audits.

Timeline of Events

1
January 1, 2026
The cyberattack on ManoMano's third-party subcontractor reportedly occurred.
2
February 27, 2026
Threat actor 'Indra' claims responsibility on a dark web forum and ManoMano begins notifying customers and regulatory authorities.
3
February 28, 2026
This article was published

MITRE ATT&CK Mitigations

Enforce MFA for all accounts, especially third-party partners, accessing sensitive customer data platforms like Zendesk.

Mapped D3FEND Techniques:

Apply the principle of least privilege to third-party accounts, ensuring they can only access the specific data required for their function.

Mapped D3FEND Techniques:

Audit

M1047enterprise

Continuously audit and monitor logs from third-party accessible systems for signs of anomalous behavior or unauthorized access.

Mapped D3FEND Techniques:

While the breach was external, training internal staff who manage vendor relationships on third-party risks is crucial.

D3FEND Defensive Countermeasures

To defend against supply chain attacks like the one affecting ManoMano, organizations must implement Resource Access Pattern Analysis, particularly for third-party accounts. This involves establishing a baseline of normal behavior for each subcontractor's access to cloud services like Zendesk. Security teams should use a CASB or native SaaS logging to monitor metrics such as the volume of data accessed, the time and day of access, the geographic location of the user, and the types of API calls made. For the ManoMano incident, alerts should have been configured to trigger if the subcontractor's account suddenly began exporting large volumes of customer data, accessed records outside of normal business hours, or logged in from an IP address inconsistent with their known location in Tunisia. By analyzing these patterns, security teams can detect a compromised third-party account in near real-time, enabling them to suspend the account and investigate before a mass data exfiltration of 43GB can be completed.

Application Configuration Hardening is a critical preventative measure. In the context of the ManoMano breach, this applies directly to the configuration of the Zendesk platform. ManoMano should enforce strict security configurations for all third-party tenants accessing their data. This includes disabling unnecessary features, enforcing session timeouts, restricting data export permissions to only specific, authorized roles, and implementing IP allow-listing to ensure the subcontractor can only access the platform from pre-approved corporate IP addresses. Furthermore, role-based access control (RBAC) within Zendesk should have been configured to ensure that individual customer service agents could only view data relevant to their immediate task, rather than having broad access to the entire customer database. Hardening these configurations would have significantly limited the attacker's ability to exfiltrate data, even if they successfully compromised an account.

While this breach originated in a third-party cloud environment, the principle of Outbound Traffic Filtering remains vital. Organizations should work with their SaaS providers to understand and control data egress pathways. Where possible, configure rules within the SaaS platform to restrict data exports to only trusted domains or IP ranges. For on-premise or IaaS environments that connect to these SaaS platforms, implementing network-level outbound filtering can help detect and block large, unexpected data transfers. For instance, a Network Detection and Response (NDR) tool could have flagged the 43GB data transfer as anomalous based on its size and destination, providing an opportunity for intervention. This creates a crucial layer of defense aimed at disrupting the final stage of the attack: data exfiltration.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

supply chain attackthird-party breache-commercePIIGDPRdark web

📢 Share This Article

Help others stay informed about cybersecurity threats