Food delivery firm DoorDash suffered a data breach exposing customer and employee data that was compromised in a cyberattack on Twilio.
The threat actor gained access to the company's internal tools using stolen credentials from a third-party vendor that had access to their systems.
As a response, they disabled the vendor's access to their system and contained the incident.
The exposed information included the names, email addresses, delivery addresses, and phone numbers of consumers. In addition, for a small subset of customers, the hackers accessed basic order information and partial credit card information, including the card type and the last four digits of the card number.
TPRM report: https://scoringcyber.rankiteo.com/company/doordash
"id": "doo0162922",
"linkid": "doordash",
"type": "Breach",
"date": "08/2022",
"severity": "80",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'industry': 'Food Delivery',
'name': 'DoorDash',
'type': 'Company'}],
'attack_vector': 'Stolen Credentials',
'data_breach': {'personally_identifiable_information': ['names',
'email addresses',
'delivery addresses',
'phone numbers'],
'type_of_data_compromised': ['names',
'email addresses',
'delivery addresses',
'phone numbers',
'basic order information',
'partial credit card '
'information']},
'description': 'DoorDash suffered a data breach exposing customer and '
'employee data that was compromised in a cyberattack on '
"Twilio. The threat actor gained access to the company's "
'internal tools using stolen credentials from a third-party '
'vendor that had access to their systems.',
'impact': {'data_compromised': ['names',
'email addresses',
'delivery addresses',
'phone numbers',
'basic order information',
'partial credit card information']},
'initial_access_broker': {'entry_point': 'Third-party Vendor'},
'response': {'containment_measures': "Disabled the vendor's access to their "
'system and contained the incident.'},
'title': 'DoorDash Data Breach',
'type': 'Data Breach',
'vulnerability_exploited': 'Third-party Vendor Access'}