Hackers compromised mobile-based Asian food delivery service Chowbus, stole customer data, and emailed victims a link pointing to the stolen data.
Many of those who received the emails posted on Reddit, revealing that the hackers exported the database to comma-separated values (CSV) files and sent links to these CSV files to Chowbus customers.
The service, which operates in Australia, Canada and the United States, has several hundreds of thousands of customers, all of whom appear to have been affected.
Information in the CSV files included names, email addresses, phone numbers, addresses (city, state, zip code), rates, and addresses for the Chowbus partner restaurants.
A total of 4,300 records were reportedly included in the CSV file for restaurants, while the file for users had 803,350 entries. The information has already been uploaded to data breach notification website Have I Been Pwned, which noted that the database included a total of 444,224 Chowbus accounts.
One of the affected users said on Reddit that the food delivery service was quick to plug the security hole and secure its systems. The link to the stolen data was no longer working hours after the incident became public.
“Thank you for bringing this to our attention. As soon as we became aware of this incident, our security team quickly took steps to secure our systems, including our customers’ account information. The link from the email is already disabled. Your credit card information does not exist in our systems. Any credit card information and transaction is processed by Stripe, a secure 3rd party payment processor. We are confident your credit card information is safe,” the company told one user.
The company also started informing customers about the incident, revealing that names, addresses, email addresses, and phone numbers were affected, but also pointing out that credit card data was not stolen.
It’s not yet clear how the attackers accessed the company’s systems or whether this was an inside job.
“We became aware of the situation at approximately 1:30 a.m. CDT on October 5 and are working diligently to address the matter. We take our responsibility for privacy and security seriously, and we are working to discover additional facts. We expect to provide additional information to our community in the coming days,” Chowbus said, responding to a SecurityWeek inquiry.
*updated with statement from Chowbus
Related: SANS Institute Says 28,000 User Records Exposed in Email Breach
Related: Intel Investigating Data Leak of Technical Documents, Tools
Related: Cloud Company Blackbaud Pays Ransomware Operators to Avoid Data Leak
Related: Japan Suspects Missile Data Leak in Mitsubishi Cyberattack