EatStreet Data Breach Risks Customers, Restaurants, Deliverers’ Information

EatStreet Data Breach Risks Customers' Information

In May, EatStreet experienced a data breach that compromised certain customers', restaurants', and deliverers' information. The service just recently disclosed the security breach.

EatStreet, an online and mobile food ordering service, recently disclosed a security breach that took place between May 3 and May 17.

The hacker, who is believed to be a hacker named Gnosticplayers, had access to EatStreet's database between these dates and through this was able to access information about delivery and restaurant partners, such as names, addresses, phone numbers, and email addresses, as well as bank accounts and routing numbers.

For a limited number of customers, the hacker accessed payment card info, including names, credit card numbers, expiration dates, card verification codes, billing addresses, email addresses, and phone numbers.

EatStreet has taken multiple notification measures to ensure everyone affected is informed. There are no law enforcement agencies involved in the ongoing investigations.

"We have enhanced the security of our systems, including reinforcing multi-factor authentication, rotating credential keys, and reviewing and updating coding practices," EatStreet said in a breach notification.

Colin Little, senior threat analyst at Centripetal Networks, said that it's unfortunate that some customers used this service for a simple food delivery and now their banking information may be compromised.

"The case of the EatStreet breach is a doomsday scenario for the average consumer where a service was used for convenience of necessity, and ended up causing a major threat to the consumer's interests," Little said. "With the number of mobile or cloud-based consumer services a person leverages day to day and the two-week time-to-detect for complete access to a database that contains some of the most sensitive PII, this event shows that consumers deserve organizations who will proactively hunt for threats to minimize the risk to consumer data."

Lisa Baergen, vice president of marketing at NuData Security, a Mastercard Company, said that once the data is stolen, it's detrimental to not only the target company, but all organizations because the hacker can make fraudulent purchases or facilitate further cybercrime. She said in light of this, organizations must figure out how to lock down their security to keep customers and other organizations secure.

"By using security layers with behavioral analytics and passive biometrics, businesses can look across multiple aspects of the user's interaction, instead of relying solely on the username, password, and other static data which could have been stolen," Baergen said. "Such techniques devalue phishing attacks and other techniques to extract data from legitimate consumers, as this is not enough to access a victim's account or make illegitimate purchases."

About the Author

Kaitlyn DeHaven is the Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Digital Access in the Workplace

    It is simple to set up a unified, robust access control solution for one tenant leasing one building. It is even easier if the tenant owns the property. But what is involved when multiple companies lease space in a building? And what about companies that have multiple buildings in the same city or locations across various regions in the country and the world? Read Now

  • Cloud and Hybrid Adoption on the Rise

    The physical security industry is experiencing a time of great transformation. Cloud connectivity is accelerating, and more organizations are choosing to blend on-premises and cloud-based solutions. This transformation is affecting all aspects of security, including access control. In the Genetec annual State of Physical Security Survey, it was access control that topped the list of new technologies end-users planned to focus on in 2024. Read Now

  • Texas City Replaces Locks on Intelligent Traffic Cabinets With More Secure Option

    The Transportation Services and Mobility department for the city of Grand Prairie, Texas recently completed a substantial project to replace the locks on their Intelligent Traffic Cabinets with a better and more secure choice. Turns out what they needed was only a few miles away with ALCEA’s Traffic Cabinet Locking Solution powered by ABLOY technology. Read Now

Featured Cybersecurity

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3