Contributor: Aleena Jibin
The phishing attack began with an email that appeared to be from Mailchimp, claiming the creator’s account had been restricted due to a spam complaint. The email urged him to click a link and resolve the issue immediately without fully verifying the source. The link redirected him to a fake Mailchimp website, where he was prompted to enter his login details and a one-time passcode (OTP).
As soon as the creator entered his credentials, the attackers captured them. They had set up an automated process that quickly exported the creator’s mailing list before he could take any preventive action.
How to spot the phishing email? - Download
This attack highlights that even an expert in cyber security and phishing awareness is not immune to such tactics. The phishing scam successfully bypassed traditional security measures, relying on human error rather than technical vulnerabilities. As a result, the creator’s credentials were stolen, and 16,000 email addresses, including those of unsubscribed users, were exposed.
The incident also demonstrates how phishing methods have become more sophisticated, making them harder to detect and defend against. By exploiting user actions instead of software flaws, attackers can easily bypass security tools. The exposed email addresses, along with other personal data, could be used for further malicious activities, such as targeted phishing or identity theft.
Even anti scammers get scammed: security expert troy hunt pwned by phishing email
Book a Demo
Get a guided demo of our courses, anti-phishing training, behavior assessments and managed services.