{"id":21717,"date":"2023-04-12T16:10:27","date_gmt":"2023-04-13T00:10:27","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/04\/12\/news-15448\/"},"modified":"2023-04-12T16:10:27","modified_gmt":"2023-04-13T00:10:27","slug":"news-15448","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2023\/04\/12\/news-15448\/","title":{"rendered":"KFC, Pizza Hut owner employee data stolen in ransomware attack"},"content":{"rendered":"<p>Upon learning that attackers accessed and siphoned data in January, Yum! Brands, the fast-food chain operator behind The Habit Burger Grill, KFC, Pizza Hut, and Taco Bell, has begun sending Notice of Security Breach letters to employees whose data were potentially affected.<\/p>\n<p>&#8220;We are writing to provide you with information about a cybersecurity incident involving your personal information that occurred mid-January 2023,&#8221; says&nbsp;<a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/23769103-yum-brands-notification-letter\" rel=\"noreferrer noopener\">the breach notice<\/a>. While the company finds &#8220;no evidence of identity theft or fraud&#8221; involving the stolen data, it says it is contacting employees &#8220;out of an abundance of caution&#8221; to provide support and resources they might need.<\/p>\n<p>The notice&nbsp;revealed&nbsp;that employee names, driver&#8217;s license numbers, and other ID card numbers are among the data that ransomware attackers took.<\/p>\n<p><a target=\"_blank\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/kfc-pizza-hut-owner-discloses-data-breach-after-ransomware-attack\/\" rel=\"noreferrer noopener\">According to BleepingComputer<\/a>, Yum! Brands has yet to provide the number of employees whose data threat actors stole during the attack.<\/p>\n<h2>The January ransomware attack<\/h2>\n<p>Over three months ago, Yum! Brands&nbsp;<a target=\"_blank\" href=\"https:\/\/www.yum.com\/wps\/portal\/yumbrands\/Yumbrands\/news\/company-stories\/Yum+Brands+January+18+2023+Statement\" rel=\"noreferrer noopener\">said<\/a>&nbsp;it had experienced a ransomware attack that affected its IT systems, forcing it to close less than 300 restaurant chains in the UK for a day.<\/p>\n<p>&#8220;Promptly upon detection of the incident, the Company initiated response protocols, including deploying containment measures such as taking certain systems offline and implementing enhanced monitoring technology,&#8221; the company said in&nbsp;<a target=\"_blank\" href=\"https:\/\/www.yum.com\/wps\/portal\/yumbrands\/Yumbrands\/news\/company-stories\/Yum+Brands+January+18+2023+Statement\" rel=\"noreferrer noopener\">a statement<\/a>. &#8220;The Company also initiated an investigation, engaged the services of industry-leading cybersecurity and forensics professionals, and notified Federal law enforcement.&#8221;<\/p>\n<p>In its filing with the Securities and Exchange Commission (SEC) in January, Yum! Brands assured investors that although the attack caused a temporary disruption, there would be no negative financial impact.<\/p>\n<p>&#8220;While this incident caused temporary disruption, the Company is aware of no other restaurant disruptions and does not expect this event to have a material adverse impact on its business, operations or financial results,&#8221; the&nbsp;<a target=\"_blank\" href=\"https:\/\/capedge.com\/filing\/1041061\/0001104659-23-004769\/YUM-8K\" rel=\"noreferrer noopener\">Form 8-K<\/a>&nbsp;mentioned.<\/p>\n<h2>&#8220;&#8230;no material adverse effect&#8230;&#8221;<\/h2>\n<p>Yum! Brands continues to believe the ransomware incident would not cause adverse operational or financial effects in the long run.<\/p>\n<p>&#8220;While the Company&#8217;s response to this incident is ongoing, at this time we do not believe such impact of the incident will ultimately have a material adverse effect on our business, results of operations or financial condition,&#8221; the company says in its&nbsp;<a target=\"_blank\" href=\"https:\/\/www.sec.gov\/Archives\/edgar\/data\/1041061\/000119312523095287\/d535046dars.pdf\" rel=\"noreferrer noopener\">2022 annual report<\/a>&nbsp;to the SEC which it filed on Friday.<\/p>\n<p>The firm has yet to disclose the ransomware group behind the attack.<\/p>\n<h2>How to avoid ransomware<\/h2>\n<ul>\n<li><strong>Block common forms of entry<\/strong>. Create a plan for <a href=\"https:\/\/www.malwarebytes.com\/business\/vulnerability-patch-management\">patching vulnerabilities<\/a> in internet-facing systems quickly; disable or <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/03\/blunting-rdp-brute-force-attacks-with-rate-limiting\">harden remote access<\/a> like RDP and VPNs; use <a href=\"https:\/\/www.malwarebytes.com\/business\/edr\">endpoint security software<\/a> that can detect exploits and malware used to deliver ransomware.<\/li>\n<li><strong>Detect intrusions<\/strong>. Make it harder for intruders to operate inside your organization by segmenting networks and assigning access rights prudently. Use <a href=\"https:\/\/www.malwarebytes.com\/business\/edr\">EDR<\/a> or <a href=\"https:\/\/www.malwarebytes.com\/business\/managed-detection-and-response\">MDR<\/a> to detect unusual activity before an attack occurs.<\/li>\n<li><strong>Stop malicious encryption<\/strong>. Deploy Endpoint Detection and Response software like <a href=\"https:\/\/www.malwarebytes.com\/business\/edr\">Malwarebytes EDR<\/a> that uses multiple different detection techniques to identify ransomware, and ransomware rollback to restore damaged system files.<\/li>\n<li><strong>Create offsite, offline backups<\/strong>. Keep backups offsite and offline, beyond the reach of attackers. Test them regularly to make sure you can restore essential business functions swiftly.<\/li>\n<li><strong>Don&rsquo;t get attacked twice.<\/strong> Once you&#8217;ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.<\/li>\n<\/ul>\n<hr \/>\n<p dir=\"ltr\">Malwarebytes removes all remnants of ransomware and prevents you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.malwarebytes.com\/business\/contact-us\/\" class=\"blue-cta-bttn\">TRY NOW<\/a><\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/04\/kfc-pizza-hut-owner-employee-data-stolen-in-ransomware-attack\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding=\"10\">\n<tr>\n<td valign=\"top\" align=\"left\">\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/news\" rel=\"category tag\">News<\/a><\/p>\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/ransomware\" rel=\"category tag\">Ransomware<\/a><\/p>\n<p>Tags: The Habit Burger Grill<\/p>\n<p>Tags:  KFC<\/p>\n<p>Tags:   Pizza Hut<\/p>\n<p>Tags:  Yum! Brands<\/p>\n<p>Tags:  ransomware<\/p>\n<p>Yum! Brands, owner of KFC, Pizza Hut, and other fast food chains, was breached in January. It recently found employee data has been compromised.<\/p>\n<table width=\"100%\">\n<tr>\n<td align=\"right\">\n<p><b>(<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/04\/kfc-pizza-hut-owner-employee-data-stolen-in-ransomware-attack\" title=\"KFC, Pizza Hut owner employee data stolen in ransomware attack\">Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/04\/kfc-pizza-hut-owner-employee-data-stolen-in-ransomware-attack\">KFC, Pizza Hut owner employee data stolen in ransomware attack<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[29089,32,29090,3765,29088,29091],"class_list":["post-21717","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-kfc","tag-news","tag-pizza-hut","tag-ransomware","tag-the-habit-burger-grill","tag-yum-brands"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21717","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=21717"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21717\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=21717"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=21717"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=21717"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}