Speciality Bakery Chain Hacked 

The Krispy Kreme Doughnut chain has reported that it has been hacked by a cyber attack that disrupted its online systems. 

Numerous US customers were unable to place online orders following the attack, which occurred at the end of November 2024, and has only now been disclosed. 

Krispy Kreme revealed that they were attacked in  a regulatory filing with the US Securities and Exchanges Commission (SEC), in which it said the incident had a serious impact on the firm's business operations.

"We're experiencing certain operational disruptions due to a cybersecurity incident, including with online ordering in parts of the United States," reads a message on the Krispy Kreme website. "We know this is an inconvenience and are working diligently to resolve the issue." To date, no criminal groups have claimed responsibility for the hack.

Krispy Kreme stated in its SEC filing that it has cyber security insurance, which it said it hopes will reduce some of the costs resulting from the breach.

Expected costs include lost revenue from online sales, costs for cybersecurity experts and any system restoration costs. Their insurance "is expected to offset a portion of the costs of the incident," the company said.
Shares of the company were down about 2% recently and are down 33% so far in 2024.

Krispy Kreme is a national retail chain in the US and has more than 1,400 shops worldwide, including 120 locations in the UK where it is  largest speciality doughnut retailer in the country

SEC   |   BitDefender   |    TechRadar   |    BBC   |   TEISS   |   Guardian   |  

Image: @krispykreme

You Might Also Read: 

E-Commerce Site Exposed Children Worldwide:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

 

« What Security Features Are Essential In BPM Software To Protect Sensitive Data?
Chinese Firm Sanctioned For Potentially Lethal Cyber Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Wizard Computing

Wizard Computing

Wizard Computer Services is a full service IT solutions provider that offers managed services, consultation, installation, and support to small and large businesses in New England.

OneLogin

OneLogin

OneLogin simplifies identity management with secure, one-click access,for employees, customers and partners, through all device types, to all enterprise cloud and on-premise applications.

Zettaset

Zettaset

Zettaset’s XCrypt Data Encryption Platform delivers proven protection for Object, Relational/SQL, NoSQL, and Hadoop data stores…in the cloud and on-premises.

Fortra

Fortra

Fortra (formerly HelpSystems) is your cybersecurity ally, unified through the mission of providing solutions to organizations' seemingly unsolvable cybersecurity problems.

CyberSure

CyberSure

CyberSure is a programme of collaborations and exchanges between researchers aimed at developing a framework for creating and managing cyber insurance policy for cyber systems.

Beryllium InfoSec Collaborative

Beryllium InfoSec Collaborative

Beryllium InfoSec Collaborative is an information security and cyber security company with 40-plus years of experience across industry & government.

Cybriant

Cybriant

Cybriant Strategic Security Services provide a framework for architecting, constructing, and maintaining a secure business with policy and performance alignment.

Voxility

Voxility

Voxility provides Infrastructure-as-a-Service in the biggest Internet hubs in the world.

Turnkey Consulting

Turnkey Consulting

Turnkey Consulting is a leading provider of Integrated Risk Management (IRM), Identity Access Management (IAM), and Cyber and Application Security.

Kalima Systems

Kalima Systems

Kalima’s mission is to securely collect, transport, store and share Industrial IoT (IIoT) trusted data in real time with devices, services and mobile workers.

North East Business Resilience Centre (NEBRC)

North East Business Resilience Centre (NEBRC)

The North East Business Resilience Centre is a non-profit organisation here to support businesses in the North East of England in protecting themselves from cyber crimes and fraud.

OSI Security

OSI Security

OSI Security's primary services include penetration testing, security auditing, web application security testing and risk management.

Ibento Global

Ibento Global

Ibento organises the CyberX series of cybersecurity conferences.

MIS Solutions

MIS Solutions

MIS Solutions is a managed cloud and IT security partner making technology work for you.

Hexagon

Hexagon

Hexagon is a global leader in digital reality solutions. We are putting data to work to boost efficiency, productivity, quality and safety.

Harmonic Security

Harmonic Security

Harmonic Security helps companies to adopt Generative AI without risking the security and privacy of their data.