Walt Disney World

Walt Disney World

An ex-employee of Walt Disney World, possessing access to the company's passwords post-termination, compromised a third-party menu-creation system used by Disney's restaurants. The attack involved altering menu fonts and listings, resulting in unusable menus and potential allergen misinformation, leading to locked employee accounts and misuse of personal employee information.

Source: https://www.wired.com/story/disney-world-menu-hack-wingdings/

TPRM report: https://scoringcyber.rankiteo.com/company/walt-disney-world

"id": "wal000110424",
"linkid": "walt-disney-world",
"type": "Breach",
"date": "11/2024",
"severity": "60",
"impact": "2",
"explanation": "Attack limited on finance or reputation"
{'affected_entities': [{'industry': 'Entertainment',
                        'location': 'Florida, USA',
                        'name': 'Walt Disney World',
                        'type': 'Company'}],
 'attack_vector': 'Compromised Credentials',
 'data_breach': {'type_of_data_compromised': ['Menu data',
                                              'Employee personal information']},
 'description': 'An ex-employee of Walt Disney World, possessing access to the '
                "company's passwords post-termination, compromised a "
                "third-party menu-creation system used by Disney's "
                'restaurants. The attack involved altering menu fonts and '
                'listings, resulting in unusable menus and potential allergen '
                'misinformation, leading to locked employee accounts and '
                'misuse of personal employee information.',
 'impact': {'data_compromised': ['Menu fonts and listings',
                                 'Employee personal information'],
            'operational_impact': 'Unusable menus and potential allergen '
                                  'misinformation',
            'systems_affected': ['Third-party menu-creation system',
                                 'Employee accounts']},
 'motivation': 'Unknown',
 'post_incident_analysis': {'root_causes': 'Post-termination access to company '
                                           'passwords'},
 'threat_actor': 'Ex-Employee',
 'title': 'Unauthorized Access and Data Misuse by Ex-Employee',
 'type': 'Unauthorized Access',
 'vulnerability_exploited': 'Post-termination access to company passwords'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.