GrubHub reveals massive data breach - customers, drivers, businesses all affected, here's what we know

GrubHub app on a mobile phone
(Image credit: Shutterstock / Diego Thomazini)

  • Food delivery service GrubHub has been breached through a third-party vendor
  • The incident left Personally Identifiable Information exposed on users and others
  • GrubHub has launched a full investigation

GrubHub has confirmed suffering a ‘security incident’ involving a third-party contractor which resulted in the unauthorized access to a set of user contact information.

The breach was detected after the firm noticed unusual activity within its environment, which it traced back to a third-party vendor that provides services for its Support Team. Once discovered, GrubHub reportedly launched an investigation and found unauthorized access to an account associated with the vendor.

The company says it took ‘immediate action’ to contain the situation and is now confident the incident is ‘fully contained’. The leaked data includes names, email addresses, phone numbers, and partial payment information for a group of users. It’s also believed the threat actor had access to hashed passwords for legacy systems.

Know your vendor

Following the incident, GrubHub said it enhanced its security by implementing enhanced monitoring services, as well as strengthening credential security and engaging forensic experts to complete a comprehensive investigation.

This incident proves just how crucial monitoring your systems and your vendors is for businesses of all sizes. Third-party data breaches have become a major security concern thanks to the vast number of vendors most firms will use, many of which are smaller companies with smaller cybersecurity budgets.

“If you want to get into a big organization you go through [third-party vendors]. You go for the low hanging fruit. We've got 14,000 vendors globally providing everything from uniforms in retail branches to large scale data centers,” Standard Chartered Bank’s Benedict Peet told TechRadar Pro.

“You've got to have a scalable security questionnaire to ask them, but the risk is still the same, whether it's a mum and pop shop in the back streets of Seoul or it's at Atos Origin or someone like that.”

Data breaches put victims at risk of identity theft, so take a look at our choices for best identity theft protection if you're concerned you might be affected.

You might also like

Ellen Jennings-Trace
Staff Writer

Ellen has been writing for almost four years, with a focus on post-COVID policy whilst studying for BA Politics and International Relations at the University of Cardiff, followed by an MA in Political Communication. Before joining TechRadar Pro as a Junior Writer, she worked for Future Publishing’s MVC content team, working with merchants and retailers to upload content.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.

Read more
A man looking at a tablet with a brown Best Buy package on the desk in front of him
Huge Christmas data breach - 14 million shipping records leaked, putting shoppers at risk
Representational image of data security
Travel data of almost 500,000 users exposed in Daytrip leak
Red padlock open on electric circuits network dark red background
McDonalds delivery customers put at risk by possible data breach
Security padlock and circuit board to protect data
Foh&Boh data leak leaves millions of CVs exposed - KFS, Taco Bell, Nordstrom applicants at risk
Outdoor photograph of a pair of hands holding a smartphone with navigator location points in the background
Millions of phone location records feared leaked as one of the biggest data leaks ever may be a whole lot worse
Avast cybersecurity
Zapier tells customers their data may have been accessed
Latest in Security
Woman using iMessage on iPhone
UK government guidelines remove encryption advice following Apple backdoor spat
Cryptocurrencies
Ransomware’s favorite Russian crypto exchange seized by law enforcement
Wordpress brand logo on computer screen. Man typing on the keyboard.
Thousands of WordPress sites targeted with malicious plugin backdoor attacks
HTTPS in a browser address bar
Malicious "polymorphic" Chrome extensions can mimic other tools to trick victims
ransomware avast
Hackers spotted using unsecured webcam to launch cyberattack
Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.
Microsoft reveals over a million PCs hit by malvertising campaign
Latest in News
Apple iPhone 16 Plus
Apple officially delays the AI-infused Siri and admits, ‘It’s going to take us longer than we thought’
The Meta Quest Pro on its charging pad on a desk, in front of a window with the curtain closed
Samsung, Apple and Meta want to use OLED in their next VR headsets – but only Meta has a plan to make it cheap
AMD Ryzen 9000 3D chips
AMD officially announces price and release date for Ryzen 9 9900X3D and 9950X3D processors
Google Pixel 9
There's something strange going on with Google Pixel phone vibrations after the latest update
A masculine hand holding the Nvidia GeForce RTX 5070 Ti
Budget gamers rejoice as Nvidia RTX 5050 and RTX 5060 are rumored to launch in April
The Asus ROG Ally handheld gaming PC
AMD's new driver adds AFMF 2.1 support for improved frame generation - and it could be a game-changer for handheld gaming PCs