Sunday, June 1, 2025
HomeCyber AttackHome Chef Hacked - Hackers Selling 8M User Records on a Dark...

Home Chef Hacked – Hackers Selling 8M User Records on a Dark Web Marketplace

Published on

SIEM as a Service

Follow Us on Google News

Home Chef, a US-based meal kit delivery service suffers a data breach, hackers stolen more than 8 million customer records.

How are when the hack attack took place is unknown, the company is investigating the situation now.

Home Chef Hacked – What Data Impacted?

The hack impacts the following customer information

- Advertisement - Google News
  • Email address, name, and phone number
  • Encrypted passwords
  • The last four digits of credit card numbers
  • Other account information such as frequency of deliveries and mailing address may also have been compromised

Home Chef is to notice the impacted customers, also the company confirms all the customers are not impacted.

If your account impacted in the breach then you will be getting notified, else the company will not alert you.

The protection of customer data is a top priority for Home Chef, and we work hard to safeguard our customers’ information.

Also, the company confirms that they do not store complete credit or debit card information.

We are taking action to investigate this situation and to strengthen our information security defenses to prevent similar incidents from happening in the future, reads FAQ published by the company.

Home Chef recommended you to reset the passwords by visiting their website, if you reuse the password then it is recommended to change with all the portals.

Learned that databases sold by Shiny Hunters contain 8 million user records for Home Chef.

Shiny Hunters started selling hacked databases that contain over 73.2 Million user records of 11 different companies over the dark web.

It all starts with the Tokopedia dump shared last week contains more than 90 million user records, followed by Unacademy dump and the hack of the Microsoft’s GitHub account.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges in Organizational Environments

A startling discovery by BeyondTrust researchers has unveiled a critical vulnerability in Microsoft Entra...

Threat Actors Exploit Google Apps Script to Host Phishing Sites

The Cofense Phishing Defense Center has uncovered a highly strategic phishing campaign that leverages...

Dadsec Hacker Group Uses Tycoon2FA Infrastructure to Steal Office365 Credentials

Cybersecurity researchers from Trustwave’s Threat Intelligence Team have uncovered a large-scale phishing campaign orchestrated...

Beware: Weaponized AI Tool Installers Infect Devices with Ransomware

Cisco Talos has uncovered a series of malicious threats masquerading as legitimate AI tool...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Microsoft Reveals Techniques for Defending Against Evolving AiTM Attacks

Microsoft has exposed the escalating sophistication of phishing attacks, particularly focusing on Adversary-in-the-Middle (AiTM)...

Weaponized PyPI Package Executes Supply Chain Attack to Steal Solana Private Keys

A chilling discovery by Socket’s Threat Research Team has exposed a meticulously crafted supply...

Safari Flaw Exploited by BitM Attack to Steal User Login Data

A new wave of phishing attacks, known as Fullscreen Browser-in-the-Middle (BitM) attacks, is exploiting...