Food Delivery Service Chowbus Hacked

Food Delivery Service Chowbus Hacked

Hackers compromised mobile-based Asian food delivery service Chowbus, stole customer data, and emailed victims a link pointing to the stolen data.

Many of those who received the emails posted on Reddit, revealing that the hackers exported the database to comma-separated values (CSV) files and sent links to these CSV files to Chowbus customers.

The service, which operates in Australia, Canada and the United States, has several hundreds of thousands of customers, all of whom appear to have been affected.

Information in the CSV files included names, email addresses, phone numbers, addresses (city, state, zip code), rates, and addresses for the Chowbus partner restaurants.

A total of 4,300 records were reportedly included in the CSV file for restaurants, while the file for users had 803,350 entries. The information has already been uploaded to data breach notification website Have I Been Pwned, which noted that the database included a total of 444,224 Chowbus accounts.

One of the affected users said on Reddit that the food delivery service was quick to plug the security hole and secure its systems. The link to the stolen data was no longer working hours after the incident became public.

“Thank you for bringing this to our attention. As soon as we became aware of this incident, our security team quickly took steps to secure our systems, including our customers’ account information. The link from the email is already disabled. Your credit card information does not exist in our systems. Any credit card information and transaction is processed by Stripe, a secure 3rd party payment processor. We are confident your credit card information is safe,” the company told one user.

The company also started informing customers about the incident, revealing that names, addresses, email addresses, and phone numbers were affected, but also pointing out that credit card data was not stolen.

It’s not yet clear how the attackers accessed the company’s systems or whether this was an inside job.

SecurityWeek has contacted Chowbus and will update the article as soon as a reply arrives.

Related: SANS Institute Says 28,000 User Records Exposed in Email Breach

Related: Intel Investigating Data Leak of Technical Documents, Tools

Related: Cloud Company Blackbaud Pays Ransomware Operators to Avoid Data Leak

Related: Japan Suspects Missile Data Leak in Mitsubishi Cyberattack

view counter
image
Ionut Arghire is an international correspondent for SecurityWeek.
Previous Columns by Ionut Arghire:
Tags:
Image

Pensée du jour :

Ce que l'homme a fait ,

l'homme peut le défaire.

 

"No secure path in the world"