How Recent Cyberattacks on Starbucks and Krispy Kreme Impact You

· 5 min read
How Recent Cyberattacks on Starbucks and Krispy Kreme Impact You
Photo by June Andrei George / Unsplash

The start of 2025 has brought with it a stark reminder of the need for robust cybersecurity. It's easy to believe that major data breaches and ransomware attacks only impact large corporations, but the truth is that these incidents have a ripple effect, potentially affecting anyone who uses online services. Recent events involving Starbucks and Krispy Kreme, coupled with guidance from the U.S. Cybersecurity and Infrastructure Security Agency (CISA), highlight critical vulnerabilities and offer actionable steps for individuals and organizations alike.

Starbucks and the Third-Party Vendor Vulnerability

In late 2024, Starbucks experienced significant disruptions due to a ransomware attack on Blue Yonder, one of its third-party software vendors. This attack resulted in the theft of over 680 gigabytes of data, including emails, documents, and insurance reports. While customers may not have directly noticed the impact when ordering their holiday lattes, the attack affected Starbucks' payroll system and its employees.

This incident underscores a crucial vulnerability in the modern digital ecosystem: the reliance on third-party vendors. Companies like Starbucks often share data with numerous vendors for various services, including software, payroll processing, and marketing. While Starbucks itself may have robust security measures, the security posture of its vendors can vary significantly.

As Josh from "All Things Secured" points out, individuals rarely have the opportunity to scrutinize the privacy policies and security practices of these third-party vendors. This creates a weak link in the chain, as a breach at a vendor can expose the data of the primary company and its customers.

In the Starbucks case, the attack on Blue Yonder demonstrates how a vulnerability in a vendor's system can have far-reaching consequences, affecting not only the vendor and Starbucks but also potentially compromising the personal information of Starbucks employees.

Looking Ahead: Increased Focus on Vendor Security

The Starbucks incident serves as a wake-up call for companies to prioritize vendor security. In 2025 and beyond, we are likely to see increased scrutiny of vendor relationships and a greater emphasis on due diligence when selecting and managing third-party providers. Companies will need to:

  • Thoroughly vet vendors: Evaluate their security practices and compliance with relevant regulations.
  • Implement security requirements: Establish clear security requirements for vendors and ensure they are contractually obligated to meet them.
  • Monitor vendor compliance: Regularly monitor vendor compliance with security requirements and conduct audits as needed.
  • Develop incident response plans: Create incident response plans that address potential breaches at vendors and outline steps for mitigating the impact.

Krispy Kreme's Doughnut Disaster: A Direct Ransomware Attack

While Starbucks experienced a breach through a third-party vendor, Krispy Kreme suffered a direct ransomware attack that disrupted its online ordering system. The attackers reportedly gained access to both employee and customer data, highlighting the vulnerability of the company's digital infrastructure.

The Vulnerability of Digital Infrastructure

The Krispy Kreme attack highlights a common issue: many companies, particularly those with brick-and-mortar roots, may not prioritize cybersecurity to the same extent as their physical security. While they may invest in physical security measures like security cameras and alarm systems, their digital infrastructure may be less robust, making them vulnerable to cyberattacks.

Companies need to recognize that their digital infrastructure is becoming increasingly important, perhaps even more so than their physical infrastructure. This requires a significant investment in cybersecurity defenses to protect against evolving threats.

The Impact on Customers

The Krispy Kreme attack potentially exposed the personal information of customers who used the online ordering system. This could include names, email addresses, phone numbers, and potentially even payment information. This information could be used for malicious purposes, such as:

  • Phishing attacks: Cybercriminals could use the stolen information to craft targeted phishing emails designed to trick customers into revealing more sensitive data.
  • Spam and marketing: The stolen email addresses could be sold to spammers or used for unsolicited marketing campaigns.
  • Identity theft: In more severe cases, the stolen information could be used to commit identity theft.

Lessons Learned: Prioritizing Cybersecurity Investment

The Krispy Kreme attack serves as a reminder that all companies, regardless of their size or industry, must prioritize cybersecurity. This requires:

  • Investing in security technology: Implementing firewalls, intrusion detection systems, and other security technologies to protect against cyberattacks.
  • Training employees: Educating employees about cybersecurity threats and best practices.
  • Developing incident response plans: Creating and regularly testing incident response plans to effectively respond to and mitigate the impact of cyberattacks.
  • Regular security audits: Conducting regular security audits to identify vulnerabilities and ensure that security measures are effective.

Protecting Yourself: Actionable Steps You Can Take

While companies have a responsibility to protect your data, there are also steps you can take to protect yourself from the consequences of data breaches and cyberattacks. Here are some actionable tips:

1. Use Email Aliases

One of the most effective ways to protect your privacy is to use email aliases when signing up for online accounts and loyalty programs. Email aliases are unique, randomly generated email addresses that forward to your primary email inbox. This allows you to:

  • Mask your real email address: Protect your primary email address from being exposed in data breaches.
  • Track which companies are sharing your data: If you start receiving spam at a specific alias, you know which company is responsible.
  • Easily disable compromised aliases: If an alias is compromised, you can simply disable it without affecting your primary email address or other accounts.
The Benefits of Using Email Aliases: How to Stay Organized and Protect Your Privacy
Have you ever asked yourself why it seems like everybody knows your e-mail? It is because we use it everywhere. Name them: for purchases, newsletter sign-ups, at the doctor’s office, and government websites! This one unique identifier links all our activities together and unfortunately, this e-mail is easily findable

2. [Use a Password Manager]https://franklinetech.com/why-using-a-password-manager-is-important/

A password manager is an essential tool for generating and storing strong, unique passwords for all of your online accounts. This helps protect you from password spraying attacks, where attackers try to use stolen email and password combinations to access other accounts.

Comprehensive comparison of popular password managers
Password managers have become a necessary tool for protecting online accounts as passwords have grown more complex, yet the best solution remains unclear with many options on the market. This post seeks to cut through the clutter by comprehensively analyzing, comparing, and contrasting features of some of the most popular

3. Enable Two-Factor Authentication (2FA)

Two-factor authentication adds an extra layer of security to your accounts by requiring you to enter a code from your phone or another device in addition to your password. This makes it much more difficult for attackers to access your accounts, even if they have your password.

4. Be Wary of Phishing Attacks

Phishing attacks are designed to trick you into revealing sensitive information, such as your username, password, or credit card number. Be wary of suspicious emails, text messages, or phone calls that ask you for personal information. Always verify the sender's identity before providing any information.

5. Keep Your Software Updated

Software updates often include security patches that fix vulnerabilities that attackers can exploit. Make sure to keep your operating system, web browser, and other software up to date.

## Convertkit Newsletter