Monday, January 6, 2025
HomeData BreachKroger Data Breach - Hackers Stole Files that Shared Through Secure File...

Kroger Data Breach – Hackers Stole Files that Shared Through Secure File Transfer Service

Published on

The Kroger Company is the United States’ largest supermarket by revenue and the second-largest general retailer.

Kroger operates almost 2,750 supermarkets in 35 states. Kroger employs approximately 500,000 people and had over $122 billion in sales for 2019.

The company has confirmed that it was impacted by the data security incident affecting Accellion, Inc. Accellion’s services were used by Kroger, as well as many other companies, for third-party secure file transfers.

- Advertisement - SIEM as a Service

An Insight into the Incident

Kroger customers and associates were affected by the Accellion data security incident. Accellion notified Kroger that an unauthorized person gained access to certain Kroger files by exploiting a vulnerability in Accellion’s file-transfer service.

The incident did not affect Kroger’s IT systems or any grocery store systems or data. No credit or debit card (including digital wallet) information or customer account passwords were affected by this incident.

Kroger discontinued the use of Accellion’s services after the incident’s effect on January 23, 2021. The company reported the incident to federal law enforcement and initiated its forensic investigation to review the potential scope and impact of the incident.

Information may have been Involved

Based on the information provided by Accellion and investigation, Kroger believes the categories of affected data may include certain associates’ HR data, certain pharmacy records, and certain money services records.

What Actions is Kroger taking to respond to this Incident?

Kroger has no indication of fraud or misuse of personal information as a result of this incident. However, Kroger is directly notifying potentially impacted customers and associates through mail notices and offering free comprehensive credit monitoring to those individuals out of an abundance of caution.

Accellion Attacks have an Extensive Impact

Accellion has more than 3,000 customers worldwide. It is said that the affected product was 20 years old and nearing the end of its life. The company said on Feb. 1 that it had patched all known FTA vulnerabilities.

In mid-December, Accellion disclosed that they learned of an actively exploited zero-day vulnerability in their FTA secure file-transfer service. Threat actors exploited this vulnerability to steal data from companies who utilized the service to communicate with customers and partners securely.

Other Accellion customers affected by the hack include the University of Colorado, Washington State’s auditor, Australia’s financial regulator, the Reserve Bank of New Zealand, and the prominent U.S. law firm Jones Day.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Also Read

Yandex Data Breach – Employee Caught Selling Access to User Accounts

Antivirus Firm Exposed Internal Log data Generated by their Products

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Stealthy Steganography Backdoor Attacks Target Android Apps

BARWM, a novel backdoor attack approach for real-world deep learning (DL) models deployed on...

The Defender vs. The Attacker Game

The researcher proposes a game-theoretic approach to analyze the interaction between the model defender...

Weaponized Python Scripts Deliver New SwaetRAT Malware

The Python script leverages low-level interactions with the Windows operating system, which imports crucial...

Windows 11 BitLocker Bypassed to Extract Encryption Keys

An attacker with physical access can abruptly restart the device and dump RAM, as...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

US Treasury Department Breach, Hackers Accessed Workstations

The Biden administration confirmed that a Chinese state-sponsored hacking group breached the U.S. Treasury...

Lumma Stealer Attacking Users To Steal Login Credentials From Browsers

Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a...

Indonesia Government Data Breach – Hackers Leaked 82 GB of Sensitive Data Online

Hackers have reportedly infiltrated and extracted a vast 82 GB of sensitive data from...