After Ransomware Attack: Fast Food Yum! The brand reports data theft

Yum! after a ransomware attack on the fast food company! Mark is said to have stolen sensitive data from some people.
Photo: T. Schneider –

Like technology magazine Bleeping Computer reports, owner of fast food chain Yum! Brands is sending data breach notification letters to a select number of individuals whose personal information was stolen in a Jan. 13 ransomware attack.

In the immediate aftermath of the attack, the company initially said that while some data had been stolen from its network, no customer information had been compromised. in the year Security breach letter The fast food group has now admitted that attackers have stolen some people’s personal data.

The leaked data reportedly includes names, driver’s license numbers and other ID numbers. However, the company stressed that ongoing investigations have found no evidence that the stolen data was used for identity theft or fraud.

According to their statements, Yum! Brands are temporarily closing some restaurants due to the ransomware attack. “On January 18, 2023, we reported a ransomware attack that affected certain IT systems and closed approximately 300 UK restaurants for a day. Our affected systems were temporarily disrupted and data was extracted from our network,” the company explained. in the same the message to the US Securities and Exchange Commission.

“We have incurred, and may incur, certain costs associated with this attack, including the costs of responding to, resolving and investigating this matter,” the statement said.

Hum! However, Brands assured investors that the ransomware attack would not have a significant negative financial impact.

“While this incident has caused a temporary disruption, the company is not aware of any other restaurant breaches and does not anticipate that this incident will have a material adverse effect on its business, operations or financial results,” the company’s SEC filing said.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top