Connect with us

Hi, what are you looking for?



Domino’s Pizza Refuses Extortion Demand After Customer Data Stolen

Attackers have tried to serve Domino’s Pizza a slice of extortion, but the pizza company is not buying.

Attackers have tried to serve Domino’s Pizza a slice of extortion, but the pizza company is not buying.

The restaurant chain said it has no plans to give in to extortion demands after a threat to release stolen customer data surfaced on Twitter. Last week, the Twitter account for the ‘Rex Mundi’ hacking group claimed to have hacked the websites for Domino’s in France and Belgium and stole data belonging to more than 600,000 customers.

In exchange for not releasing the data, the hackers demanded a payment of 30,000 euros. They also stated that while Domino’s fixed one vulnerability on their Belgium site, the company had left others behind that can be exploited. The Rex Mundi Twitter account has since been suspended.

The data was stolen from a system used in the company’s online ordering operation. According to Domino’s, no customer credit card or financial information was compromised in the attack, as the system used in those franchise markets is outdated and does not accept credit card orders.

“Plans were already in place to have the system roll over ot the platform we use in the U.S.,” Tim McIntyre, vice president of communications at Domino’s, told SecurityWeek. “The site has been secured. The franchise is working with law enforcement in France.”

“This does not affect any market outside of France (229 stores) and Belgium (24 stores),” he added. “There are no plans to pay off this extortion threat.”

According to reports, the stolen information includes customer names, delivery addresses, phone numbers, email addresses and passwords.

Advertisement. Scroll to continue reading.

“Databases containing customer information are everywhere, and unsurprisingly, poorly secured,” said Jean Taggart, senior security researcher at Malwarebytes.

“The ‘no financial information’ quip rings hollow,” he added. “A leak involving a home address, a valid email, and a phone number seems damaging enough. Kudos to Domino’s for refusing to cough up ransom money, which would have set a bad precedent, but they should shutter their online ordering site until they have corrected the flaw that leaks out their users’ personal information. This also serves as another strong reminder not to use the same credentials across multiple services, as we can rest assured the members of Rex Mundi are probably testing their ill-gotten credentials against other services as we speak.”

The attack, noted RedSeal Networks CTO Mike Lloyd, is also significant because it demonstrates how complex today’s business infrastructure is.

“Bad guys only need to find one weakness to find a target of interest; defenders need to find them all. This makes for an asymmetric situation,” Lloyd said. “Companies cannot simply stop storing all information, and nor can we expect complexity of networks to decrease. The only viable path forward is automation to gain visibility into all the weaknesses, everywhere, in order to improve defensive posture before this happens again.” 

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.


As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Artificial Intelligence

The degree of danger that may be introduced when adversaries start to use AI as an effective weapon of attack rather than a tool...