EatStreet Data Breach Risks Customers, Restaurants, Deliverers’ Information

EatStreet Data Breach Risks Customers' Information

In May, EatStreet experienced a data breach that compromised certain customers', restaurants', and deliverers' information. The service just recently disclosed the security breach.

EatStreet, an online and mobile food ordering service, recently disclosed a security breach that took place between May 3 and May 17.

The hacker, who is believed to be a hacker named Gnosticplayers, had access to EatStreet's database between these dates and through this was able to access information about delivery and restaurant partners, such as names, addresses, phone numbers, and email addresses, as well as bank accounts and routing numbers.

For a limited number of customers, the hacker accessed payment card info, including names, credit card numbers, expiration dates, card verification codes, billing addresses, email addresses, and phone numbers.

EatStreet has taken multiple notification measures to ensure everyone affected is informed. There are no law enforcement agencies involved in the ongoing investigations.

"We have enhanced the security of our systems, including reinforcing multi-factor authentication, rotating credential keys, and reviewing and updating coding practices," EatStreet said in a breach notification.

Colin Little, senior threat analyst at Centripetal Networks, said that it's unfortunate that some customers used this service for a simple food delivery and now their banking information may be compromised.

"The case of the EatStreet breach is a doomsday scenario for the average consumer where a service was used for convenience of necessity, and ended up causing a major threat to the consumer's interests," Little said. "With the number of mobile or cloud-based consumer services a person leverages day to day and the two-week time-to-detect for complete access to a database that contains some of the most sensitive PII, this event shows that consumers deserve organizations who will proactively hunt for threats to minimize the risk to consumer data."

Lisa Baergen, vice president of marketing at NuData Security, a Mastercard Company, said that once the data is stolen, it's detrimental to not only the target company, but all organizations because the hacker can make fraudulent purchases or facilitate further cybercrime. She said in light of this, organizations must figure out how to lock down their security to keep customers and other organizations secure.

"By using security layers with behavioral analytics and passive biometrics, businesses can look across multiple aspects of the user's interaction, instead of relying solely on the username, password, and other static data which could have been stolen," Baergen said. "Such techniques devalue phishing attacks and other techniques to extract data from legitimate consumers, as this is not enough to access a victim's account or make illegitimate purchases."

About the Author

Kaitlyn DeHaven is the Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • New Report Says Vulnerability Exploitation Boom Threatens Cybersecurity

    Verizon Business recently released the findings of its 17th-annual Data Breach Investigations Report (DBIR), which analyzed a record-high 30,458 security incidents and 10,626 confirmed breaches in 2023—a two-fold increase over 2022. Read Now

  • In The Clouds

    Video data storage in the cloud was a novel concept when Dean Drako founded Eagle Eye Networks back in 2012. While cloud was being used for almost all other business systems at that time, the physical security industry took a cautious and measured approach to cloud adoption. Read Now

  • Surveillance Cameras Provide Peace of Mind for New Florida Homeowners

    Managing a large estate is never easy. Tack on 2 acres of property and keeping track of the comings and goings of family and visitors becomes nearly impossible. Needless to say, the new owner of a $10 million spec home in Florida was eager for a simple way to monitor and manage his 15,000-square-foot residence, 2,800-square-foot clubhouse and expansive outdoor areas. Read Now

Featured Cybersecurity

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3