{"id":8174,"date":"2023-04-10T18:43:07","date_gmt":"2023-04-10T09:43:07","guid":{"rendered":"https:\/\/cyberenso.jp\/?p=8174"},"modified":"2023-04-18T18:48:12","modified_gmt":"2023-04-18T09:48:12","slug":"brand-owner-of-kfc-taco-bell-and-pizza-hut-disclose-data-breach-following-ransomware-attack","status":"publish","type":"post","link":"https:\/\/cyberenso.jp\/en\/brand-owner-of-kfc-taco-bell-and-pizza-hut-disclose-data-breach-following-ransomware-attack\/","title":{"rendered":"Brand owner of KFC, Taco Bell and Pizza Hut disclose data breach following ransomware attack"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"8174\" class=\"elementor elementor-8174\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1ed9087 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1ed9087\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d7940fa\" data-id=\"d7940fa\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ff47da7 elementor-widget elementor-widget-text-editor\" data-id=\"ff47da7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>On Thursday 6<sup>th<\/sup> of April 2023, Yum! Brands, the fast food brand operator of KFC, Pizza Hut, Taco Bell, and Habit Burger, started sending data breach notification letters to individuals whose personal information was stolen during a ransomware attack that happened on Friday 13<sup>th<\/sup> of January 2023.<\/p><p>The notification letter revealed that during an ongoing investigation, Yum! Brands have found out the threat actor was able to steal some individuals&#8217; personal information, including names, driver&#8217;s license numbers, and other ID card numbers. However, the ongoing investigation had not found evidence that the stolen data had been used for identity theft or fraud. And they had found no evidence that customers were\u00a0affected by this data breach.<\/p><p>&#8220;In the course of our forensic review and investigation, we identified some personal information belonging to employees was exposed during the January 2023 cybersecurity incident&#8221; \u2013 A statement given to BleepingComputer.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>On Thursday 6th of April 2023, Yum! Brands, the fast food brand operator of KFC, Pizza Hut, Taco Bell, and Habit Burger, started sending data breach notification letters to individuals whose personal information was stolen during a ransomware attack that happened on Friday 13th of January 2023. The notification letter revealed that during an ongoing investigation, Yum! Brands have found<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":8179,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,12,2,8,223,1],"tags":[],"class_list":["post-8174","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-latest_news","category-read_article","category-ce_news","category-industry_sector","category-retail-and-e-commerce","category-uncategorized"],"acf":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2023\/04\/Picture1-1.jpg?fit=1379%2C776&ssl=1","_links":{"self":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/8174"}],"collection":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/comments?post=8174"}],"version-history":[{"count":6,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/8174\/revisions"}],"predecessor-version":[{"id":8182,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/8174\/revisions\/8182"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media\/8179"}],"wp:attachment":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media?parent=8174"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/categories?post=8174"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/tags?post=8174"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}