Third-Party Data Breach at Online DIY Firm ManoMano Affects Nearly 38 Million People - CPO Magazine
Vendor Access Compromise as Primary Attack Vector: ManoMano Breach Exposes Contractual and Governance Gaps in Third-Party Risk Management
Why This Matters at Board and Regulatory Level
The ManoMano incident—affecting nearly 38 million customers through a compromised subcontractor's Zendesk instance—represents a structural failure in vendor access governance that extends far beyond a single platform vulnerability. This breach exemplifies a recurring pattern in EU and global supply chains: organizations maintain contractual relationships with vendors whose own third-party dependencies remain unmapped, unmonitored, and inadequately secured. For boards and compliance officers, this case demonstrates why vendor risk frameworks must extend beyond direct contractual partners to encompass the entire chain of access and data custody. The scale of exposure and the simplicity of the attack vector—compromised credentials at a support platform—signal that organizations have not yet internalized the governance implications of nested vendor architectures.
The Governance Blind Spot: Unmapped Subcontractor Dependencies
The breach mechanism itself reveals a critical governance blind spot. ManoMano's reliance on Zendesk for customer support created a legitimate data access pathway; attackers exploited this by compromising the subcontractor's Zendesk credentials or instance configuration. This is not a zero-day vulnerability or sophisticated supply chain attack in the traditional sense—it is a failure of access control hygiene at a vendor level. Organizations often negotiate data protection clauses with primary vendors but fail to establish equivalent security requirements for vendors' own service providers. The contractual chain breaks at the second or third link, leaving exposure unaddressed in SLAs, DPAs, and audit rights. Most vendor agreements contain no visibility requirements for subcontractor security posture, no mandatory disclosure of vendor incidents affecting customer data, and no contractual mechanisms to enforce security standards across the supply chain.
Regulatory Exposure: NIS2, DORA, and Notification Complexity
From a regulatory perspective, this incident creates immediate NIS2 and DORA implications for affected organizations. Under NIS2, essential and important entities must now assess whether their vendor management practices constitute a material gap in their supply chain security posture. DORA's third-country operational resilience requirements similarly demand visibility into where critical data and functions are processed—including by vendors' subcontractors. ManoMano's breach will likely trigger regulatory inquiries not only into the platform's own incident response but into whether customers received timely, accurate notification of the breach's scope and the vendor chain involved. The 38 million figure itself suggests potential cross-border notification obligations under GDPR, ePrivacy Directive, and sector-specific rules (particularly for healthcare, financial services, and energy customers). Organizations that relied on ManoMano must now determine their own notification obligations to end customers, regulators, and supervisory authorities—a process complicated by the fact that they may lack full visibility into what data was actually exposed and which customer segments were affected.
Contractual Liability and Insurance Coverage Gaps
Contractual and liability exposure emerges as a secondary but severe consequence. Organizations that relied on ManoMano for e-commerce or supply chain operations now face questions about their own vendor contracts: Did they require ManoMano to maintain specific security standards for subcontractors? Did they reserve audit rights extending to third-party service providers? Were there contractual triggers for mandatory disclosure of vendor security incidents? Most standard vendor agreements lack these provisions, leaving customers with limited recourse and creating ambiguity around liability allocation. Additionally, cyber liability insurance policies often contain vendor management exclusions—if an insured organization failed to conduct adequate due diligence on ManoMano's vendor chain, claims may be denied. This creates a compounding risk: organizations face both direct customer liability (for data breach notification, regulatory fines, and reputational harm) and potential insurance denial if their vendor risk management is deemed inadequate.
Systemic Weakness: The Assumption of Vendor Security Responsibility Boundaries
Cybersol's assessment identifies a systemic weakness that organizations consistently overlook: the assumption that vendor security responsibility ends at the primary contractual boundary. In practice, modern SaaS and platform dependencies create nested access architectures where data flows through multiple vendors' systems. Organizations must establish a tiered vendor risk framework that includes: (1) direct vendor security assessments and contractual controls; (2) mandatory disclosure and audit rights for vendors' own critical subcontractors; (3) contractual requirements that vendors maintain equivalent security standards for their service providers; and (4) incident notification clauses that specify scope, timeline, and technical detail requirements. The ManoMano case also underscores the importance of data minimization—organizations should audit what customer data actually requires storage in vendor support systems and implement technical controls (encryption, tokenization, access restrictions) to limit exposure if those systems are compromised. This is not merely a vendor management best practice; it is now a regulatory expectation under NIS2 and DORA, and a contractual necessity for managing liability exposure.
Closing Reflection
The ManoMano breach serves as a governance case study for boards and compliance teams evaluating whether their vendor risk frameworks adequately address nested third-party dependencies and whether contractual language reflects the reality of modern data custody chains. Organizations should review the original CPO Magazine article for full incident details and timeline, and use this incident as a trigger for immediate vendor contract review, subcontractor mapping, and incident notification clause enhancement.
Original Source: CPO Magazine. "Third-Party Data Breach at Online DIY Firm ManoMano Affects Nearly 38 Million People." https://www.cpomagazine.com/cyber-security/third-party-data-breach-at-online-diy-firm-manomano-affects-nearly-38-million-people/