Home OSINT News Signals
CYBER2026-02-26

European DYI chain ManoMano data breach impacts 38 million customers

A major data breach at the popular European online marketplace ManoMano has exposed the personal information of approximately 38 million customers, raising significant cybersecurity alarms across the continent. The incident, first detected by internal security teams last week, is believed to have originated from a sophisticated phishing campaign that successfully targeted several company employees. This initial breach provided attackers with the credentials needed to access internal systems, setting the stage for a far more extensive compromise.

Security analysts investigating the breach have identified the use of a previously unknown, or zero-day, vulnerability in the platform's customer relationship management software. This critical flaw allowed the attackers to move laterally through ManoMano's network undetected for several days. During this period, they deployed a novel form of ransomware designed not just to encrypt data, but to systematically exfiltrate vast datasets containing customer names, email addresses, postal addresses, and hashed password data.

The ransomware's unique structure has puzzled experts. Unlike typical attacks that immediately lock systems and demand payment, this malware operated stealthily, prioritizing data theft. Early analysis suggests the attackers may be leveraging blockchain technology to create an immutable, anonymous ledger of the stolen data, potentially for sale or for use in future targeted exploits. This method represents an alarming evolution in cybercriminal tactics, blending data breach extraction with ransomware pressure.

Company officials confirmed the scale of the breach in a public statement early this morning, noting that financial information and payment card details were stored separately and do not appear to have been accessed. "We are deeply sorry for this incident and the concern it causes our customers," a ManoMano spokesperson said. "We have contained the breach, notified relevant data protection authorities, and are working with leading cybersecurity firms to investigate fully." All affected users are being contacted directly and are urged to immediately change their passwords.

The fallout from the breach extends beyond immediate customer risk. The stolen data provides a rich resource for follow-on phishing attacks, credential stuffing campaigns, and identity fraud. Cybersecurity agencies in France and the European Union have issued alerts, warning that ManoMano customers should be extremely cautious of any unsolicited communications claiming to be from the company or related services. The exploit of the zero-day vulnerability also raises questions about software supply chain security for retailers.

As the investigation continues, the focus is shifting to the perpetrators and their motives. No ransom demand has been made public, leading some analysts to speculate that the primary goal was data acquisition rather than immediate financial gain through crypto payments. The incident serves as a stark reminder of the interconnected threats in the modern digital landscape, where phishing, unpatched vulnerabilities, and advanced malware can combine to create devastating data breaches, impacting millions in an instant.

Back to News