Dunkin' Donuts drops some dough to glaze over lawsuit accusing it of covering up customer account hacks

No way to sugarcoat this: New York AG eclairs the 2015 data theft matter settled


Dunkin' Donuts today settled a lawsuit in which it was accused of hushing up the fact hackers siphoned its customers' personal information from its systems in 2015.

The US coffee-and-pastry slinger will refund said customers as part of an agreement [PDF] that will end a lawsuit brought against it by New York. The US state claimed Dunkin failed to warn its sugar addicts that miscreants had gained access to their DD accounts, downloaded their details, and sold them on underground internet forums. That information included their Dunkin' loyalty card details, which miscreants could use to buy stuff from the coffee houses using money stored on the cards.

In addition to refunding its sugar addicts for fraudulent charges made to their cards, Dunkin will pay New York $650,000 and agree to the standard "we won't let this happen again" promise.

"Long before the New York Attorney General filed suit in this matter, Dunkin’ had voluntarily implemented or enhanced the security measures identified in today’s settlement," Dunkin' said in a statement to The Register. "We did so not because we were required to by any regulatory or enforcement authority, but because we are committed to protecting our customers’ data. We are continually updating and enhancing our security measures to address ever-evolving cyber security threats, and we use robust information security and data safeguards."

The case goes back five years, when hackers used credential-stuffing to break into customer accounts. That's the technique in which a crook extracts a username and password from one website and tries it other websites to see if the login details also work. It's why you should have a unique password per site or online service you use.

Someone with their finger over their lips to say sssh

UN didn't patch SharePoint, got mega-hacked, covered it up, kept most staff in the dark, finally forced to admit it

READ MORE

Once logged in, the criminals were able to get the numbers of the DD in-store cards customers could load up with cash and then use to pay for coffee and food. The stolen cards, around 20,000 of them, were then re-sold on dark web forums to other criminals who would then use them to get "free" food and drink at the chain.

The theft itself isn't exactly the crime of the century, though what really drew the ire of NY Attorney General Letitia James was the way Dunkin' handled word of the break-ins. It was alleged the chain's bosses more or less ignored any warnings from an outside software maker that people's accounts were being ransacked, and that the biz kept customers in the dark about the mass hijackings.

"Dunkin’ was repeatedly alerted to attackers’ ongoing attempts to log in to customer accounts by a third-party app developer," the AG's office said in announcing the settlement. "The app developer even provided Dunkin’ with a list of nearly 20,000 accounts that had been compromised by attackers over just a sample five-day period.

"Yet, Dunkin’ failed to conduct an investigation into the attacks to identify other customer accounts that had been compromised, determine what customer information had been acquired, or whether customer funds had been stolen."

The account thefts remained a secret to the public for three years, it is said. Over that time the hackers and their underworld clients were able to rack up charges on victims' accounts. At no time were the customer passwords reset or frozen. It was only in 2018 that the leak would come to light, and one year later the state would sue for alleged violations of its data breach notification and consumer protection laws.

Even as the suit was ongoing, the AG's office claimed, thousands of new hacked accounts were being discovered. The settlement covers those whose cards were compromised all the way up to April 30 of this year.

Now, at least, folks will be notified of the account thefts and have any fraudulent charges reversed. As part of the settlement package, Dunkin' will also agree to beef up its security protections to include "at a minimum, reasonable technological, administrative, and physical safeguards."

This, of course, is all depending on the settlement being granted final approval from a judge. ®

Similar topics

Broader topics

Narrower topics


Other stories you might like

  • Abortion rights: US senators seek ban on sale of health location data
    With Supreme Court set to overturn Roe v Wade, privacy is key

    A group of senators wants to make it illegal for data brokers to sell sensitive location and health information of individuals' medical treatment.

    A bill filed this week by five senators, led by Senator Elizabeth Warren (D-MA), comes in anticipation the Supreme Court's upcoming ruling that could overturn the 49-year-old Roe v. Wade ruling legalizing access to abortion for women in the US.

    The worry is that if the Supreme Court strikes down Roe v. Wade – as is anticipated following the leak in May of a majority draft ruling authored by Justice Samuel Alito – such sensitive data can be used against women.

    Continue reading
  • Spain, Austria not convinced location data is personal information
    Privacy group NOYB sues to get telcos to respect GDPR data access rights

    Some authorities in Europe insist that location data is not personal data as defined by the EU's General Data Protection Regulation.

    EU privacy group NOYB (None of your business), set up by privacy warrior Max "Angry Austrian" Schrems, said on Tuesday it appealed a decision of the Spanish Data Protection Authority (AEPD) to support Virgin Telco's refusal to provide the location data it has stored about a customer.

    In Spain, according to NOYB, the government still requires telcos to record the metadata of phone calls, text messages, and cell tower connections, despite Court of Justice (CJEU) decisions that prohibit data retention.

    Continue reading
  • Israeli air raid sirens triggered in possible cyberattack
    Source remains unclear, plenty suspect Iran

    Air raid sirens sounded for over an hour in parts of Jerusalem and southern Israel on Sunday evening – but bombs never fell, leading some to blame Iran for compromising the alarms. 

    While the perpetrator remains unclear, Israel's National Cyber Directorate did say in a tweet that it suspected a cyberattack because the air raid sirens activated were municipality-owned public address systems, not Israel Defense Force alarms as originally believed. Sirens also sounded in the Red Sea port town of Eilat. 

    Netizens on social media and Israeli news sites pointed the finger at Iran, though a diplomatic source interviewed by the Jerusalem Post said there was no certainty Tehran was behind the attack. The source also said Israel faces cyberattacks regularly, and downplayed the significance of the incident. 

    Continue reading
  • TikTok US traffic defaults to Oracle Cloud, Beijing can (allegedly) still have a look
    Alibaba hinted the gig was worth millions each year

    The US arm of Chinese social video app TikTok has revealed that it has changed the default location used to store users' creations to Oracle Cloud's stateside operations – a day after being accused of allowing its Chinese parent company to access American users' personal data.

    "Today, 100 percent of US user traffic is being routed to Oracle Cloud Infrastructure," the company stated in a post dated June 18.

    "For more than a year, we've been working with Oracle on several measures as part of our commercial relationship to better safeguard our app, systems, and the security of US user data," the post continues. "We still use our US and Singapore datacenters for backup, but as we continue our work we expect to delete US users' private data from our own datacenters and fully pivot to Oracle cloud servers located in the US."

    Continue reading

Biting the hand that feeds IT © 1998–2022