Friday, January 23, 2026

How a Top Security Expert Got Phished and Lost 16,000 Emails

In a shocking turn of events, cybersecurity expert Troy Hunt, founder of the data breach notification service HaveIBeenPwned, has fallen victim to a sophisticated phishing attack. The breach resulted in the theft of his entire mailing list, exposing the email addresses of approximately 16,000 subscribers. This incident serves as a powerful reminder that even the most security-savvy individuals are not immune to well-crafted social engineering scams that are becoming increasingly common.

A Deceptively Simple Phishing Attack

The attack began with an email that appeared to be a legitimate notification from Mailchimp, the platform Hunt uses for his newsletters. The email cleverly stated that his account’s sending abilities had been restricted due to a spam complaint and prompted him to log in to resolve the issue.

Unlike many phishing attempts, this email was professionally written and designed. It created a sense of urgency without raising immediate alarm bells. Hunt clicked the link, which led to a convincing fake login page at the domain “mailchimp-sso.com.” He entered his username, password, and even the one-time password (OTP) from his authenticator app.

The entire process was designed to steal his credentials in real time. Within minutes of Hunt submitting his information, the attackers, using an IP address in New York, logged into his real Mailchimp account and exported his entire subscriber list.

How an Expert Overlooked the Red Flags

In a detailed blog post, Hunt explained the series of factors that led to the lapse in his usual security judgment. He admitted that being human played the biggest role, but several specific conditions made him more vulnerable.

The primary red flag was that his password manager, 1Password, did not offer to autofill his credentials on the fake login page. This is a key security feature, as password managers only fill information on websites with the correct, verified URL. He overlooked this crucial warning sign in the moment.

  • Jetlag and Distraction: Hunt was traveling at the time, which left him tired and less alert than normal.
  • Psychological Triggers: The scam played on his concern for his newsletter’s deliverability, a fear that prompted him to act quickly without thinking.
  • Polished Execution: The email and fake website were highly convincing, lacking the usual typos or grammatical errors that often give away phishing scams.

“It socially engineered me into believing I wouldn’t be able to send out my newsletter,” Hunt wrote, explaining how the scam used a subtle fear tactic rather than an overt threat.

The Role of Mailchimp and Data Retention

The breach also brought to light a concerning data retention policy at Mailchimp. When the attackers exported Hunt’s subscriber list, it contained not only active subscribers but also the email addresses of individuals who had previously unsubscribed.

This discovery means that Mailchimp retains unsubscribed email addresses indefinitely. People who had specifically opted out of communications, likely assuming their data was removed, were still included in the stolen list. This practice raises significant questions about user privacy and data minimization principles, as stored data remains vulnerable to future breaches.

Key Lessons from a Cybersecurity Pro’s Mistake

While the phishing site was quickly shut down by Cloudflare, the data was already gone. This incident provides critical lessons for everyone, from average users to security professionals. The nature of online threats is evolving, and defense strategies must adapt.

The most important takeaway is that multi-factor authentication (MFA) is not a silver bullet. If an attacker can trick you into entering your password and OTP on a fake site, they can use that information to bypass MFA on the real service. This is why it is critical to always verify the website’s URL before entering any sensitive information.

Hunt’s experience also underscores the value of listening to your security tools. The failure of his password manager to autofill was the most significant technical warning he missed. For users, this should serve as a hard stop. If your password manager doesn’t recognize a site, you shouldn’t either. The incident is a sobering lesson that vigilance and a healthy dose of skepticism are essential defenses against today’s cyber threats.

Davis Emily
Davis Emily
Emily is a versatile and passionate content writer with a talent for storytelling and audience engagement. With a degree in English and expertise in SEO, she has crafted compelling content for various industries, including business, technology, healthcare, and lifestyle, always capturing her unique voice.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Share post:

Recent

More like this
Related

How to Get the Senior Discount for Amazon Prime Membership

Amazon Prime offers incredible convenience with its free shipping,...

How to Become an Amazon Delivery Driver: a Complete Guide

You can become an Amazon delivery driver by meeting...

China’s Underground Raves: a Secret Space for Youth Freedom

In the city of Changchun, China, a different kind...

How to Complain About an Amazon Driver for a Quick Resolution

When your Amazon package arrives late, damaged, or is...