- Food Delivery Service Grubhub has been broken through a third -party provider
- The incident left personally identifiable information exposed to users and others
- Grubhub has launched a full study
Grubhub has confirmed to suffer a ‘security event’ involving a third -party contractor that resulted in the unauthorized access to a set of user contact information.
The violation was discovered after the company noticed unusual activity within its environment, as it is traced back to a third -party provider who provides services to its support team. When Grubhub was discovered, Grubhub allegedly launched an investigation and found unauthorized access to an account attached to the seller.
The company says it took ‘immediate action’ to contain the situation and is now convinced that the incident is ‘fully contained’. The leaked data includes names, E -email addresses, phone numbers and partial payment information for a group of users. It is also believed that the threat actor had access to Hashede passwords for older systems.
Know your supplier
After the incident, Grubhub said it improved its security by implementing improved surveillance services as well as strengthening security of credentials and engaging forensic experts to conduct a comprehensive study.
This incident shows how important monitoring your systems and your suppliers are for businesses of all sizes. Third-party data violations have become a major security problem thanks to the large number of suppliers that most companies will use, many of which are smaller companies with smaller cybersecurity budgets.
“If you want to get into a large organization you go through [third-party vendors]. You go for the low hanging fruit. We have 14,000 suppliers globally that supply everything from uniforms in retail branches to large -scale data centers, ”Standard Chartered Bank’s Benedict Peet told Techradar Pro.
“You have to have a scalable security questionnaire to ask them, but the risk is still the same, whether it is a mother and pop shop in the back streets of Seoul, or it is on ato’s origin or one.”
Data violations put victims at risk of identity theft, so look at our choice for best protection of identity theft, if you are concerned, you may be affected.