38 million
In a significant supply chain attack, European e-commerce retailer ManoMano has confirmed a data breach affecting approximately 38 million customers. The incident originated from the compromise of a third-party customer support subcontractor in January 2026. A threat actor using the alias Indra claims to have exfiltrated 43GB of customer data, including full names, email addresses, phone numbers, and the content of support communications. While financial data and passwords were not exposed, the stolen personal information presents a substantial risk of sophisticated phishing and social engineering attacks against the affected individuals across ManoMano's five European markets. ManoMano has notified regulatory bodies, including France's CNIL, and is implementing remediation measures.
The breach was first brought to public attention when a threat actor named Indra posted on a dark web forum claiming responsibility. The actor stated they had exfiltrated 43GB of data from ManoMano by compromising a customer support service provider located in Tunisia. The attack vector appears to be a compromised Zendesk account used by the subcontractor, highlighting a critical failure in third-party access security. The exposed data covers ManoMano's entire European customer base, spanning France, Germany, Italy, Spain, and the United Kingdom.
ManoMano, a major retailer with over 50 million unique monthly visitors, confirmed the breach's third-party origin. The company stressed that its internal servers remained secure and that no financial details or account passwords were part of the compromised dataset. The primary threat now lies in the hands of the attackers, who possess a rich dataset of Personally Identifiable Information (PII) and private customer service conversations, which can be weaponized for highly targeted and convincing fraud attempts.
The attack exemplifies a classic supply chain compromise, where attackers target a weaker link in an organization's ecosystem to gain access to valuable data. The threat actor Indra likely identified and exploited a vulnerability or weak credentials associated with the subcontractor's access to ManoMano's customer support platform.
T1199 - Trusted Relationship): The core of this attack was the exploitation of the trusted relationship between ManoMano and its customer service subcontractor. The attacker did not need to breach ManoMano's perimeter directly.T1584 - Compromise Infrastructure): The threat actor compromised the infrastructure of the third-party vendor, possibly through phishing, credential stuffing, or exploiting an unpatched vulnerability in the vendor's systems.T1078.004 - Cloud Accounts): The claim of a compromised Zendesk account suggests the attacker gained access using legitimate, albeit stolen, credentials.T1530 - Data from Cloud Storage): Once inside the customer support platform, the attacker exfiltrated sensitive customer data, including PII and conversation logs.T1041 - Exfiltration Over C2 Channel): The 43GB of data was exfiltrated to attacker-controlled infrastructure.This incident is a stark reminder that an organization's security posture is only as strong as its weakest third-party vendor. The stolen data, particularly the content of customer service communications, provides attackers with unique context to craft highly believable social engineering campaigns.
The business impact for ManoMano is multi-faceted, extending beyond immediate financial costs. The breach affects 38 million individuals, exposing them to significant personal risk from phishing, identity theft, and fraud. For ManoMano, the repercussions include:
Organizations must extend their monitoring capabilities to third-party interactions and cloud service usage.
D3-RAPA: Resource Access Pattern Analysis is a key defensive technique here.Preventing supply chain attacks requires a robust Third-Party Risk Management (TPRM) program.
M0939 - Third-party Software/Component Review): Conduct rigorous security assessments of all vendors before granting them access to sensitive data. This should include reviewing their security policies, certifications, and incident response plans.M1026 - Privileged Account Management): Ensure third-party accounts have the absolute minimum level of access required to perform their duties. Data access should be scoped and time-bound wherever possible.M1032 - Multi-factor Authentication): Enforce the use of strong, phishing-resistant multi-factor authentication for all third-party access to internal or cloud-based systems.M0951 - Vendor Configuration/Patching Guidance): Implement strong contractual agreements that legally require vendors to adhere to your security standards, report incidents promptly, and submit to regular audits.Enforce MFA for all accounts, especially third-party partners, accessing sensitive customer data platforms like Zendesk.
Mapped D3FEND Techniques:
Apply the principle of least privilege to third-party accounts, ensuring they can only access the specific data required for their function.
Continuously audit and monitor logs from third-party accessible systems for signs of anomalous behavior or unauthorized access.
While the breach was external, training internal staff who manage vendor relationships on third-party risks is crucial.
To defend against supply chain attacks like the one affecting ManoMano, organizations must implement Resource Access Pattern Analysis, particularly for third-party accounts. This involves establishing a baseline of normal behavior for each subcontractor's access to cloud services like Zendesk. Security teams should use a CASB or native SaaS logging to monitor metrics such as the volume of data accessed, the time and day of access, the geographic location of the user, and the types of API calls made. For the ManoMano incident, alerts should have been configured to trigger if the subcontractor's account suddenly began exporting large volumes of customer data, accessed records outside of normal business hours, or logged in from an IP address inconsistent with their known location in Tunisia. By analyzing these patterns, security teams can detect a compromised third-party account in near real-time, enabling them to suspend the account and investigate before a mass data exfiltration of 43GB can be completed.
Application Configuration Hardening is a critical preventative measure. In the context of the ManoMano breach, this applies directly to the configuration of the Zendesk platform. ManoMano should enforce strict security configurations for all third-party tenants accessing their data. This includes disabling unnecessary features, enforcing session timeouts, restricting data export permissions to only specific, authorized roles, and implementing IP allow-listing to ensure the subcontractor can only access the platform from pre-approved corporate IP addresses. Furthermore, role-based access control (RBAC) within Zendesk should have been configured to ensure that individual customer service agents could only view data relevant to their immediate task, rather than having broad access to the entire customer database. Hardening these configurations would have significantly limited the attacker's ability to exfiltrate data, even if they successfully compromised an account.
While this breach originated in a third-party cloud environment, the principle of Outbound Traffic Filtering remains vital. Organizations should work with their SaaS providers to understand and control data egress pathways. Where possible, configure rules within the SaaS platform to restrict data exports to only trusted domains or IP ranges. For on-premise or IaaS environments that connect to these SaaS platforms, implementing network-level outbound filtering can help detect and block large, unexpected data transfers. For instance, a Network Detection and Response (NDR) tool could have flagged the 43GB data transfer as anomalous based on its size and destination, providing an opportunity for intervention. This creates a crucial layer of defense aimed at disrupting the final stage of the attack: data exfiltration.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats