Saturday, March 15, 2025
HomeData BreachKroger Data Breach - Hackers Stole Files that Shared Through Secure File...

Kroger Data Breach – Hackers Stole Files that Shared Through Secure File Transfer Service

Published on

SIEM as a Service

Follow Us on Google News

The Kroger Company is the United States’ largest supermarket by revenue and the second-largest general retailer.

Kroger operates almost 2,750 supermarkets in 35 states. Kroger employs approximately 500,000 people and had over $122 billion in sales for 2019.

The company has confirmed that it was impacted by the data security incident affecting Accellion, Inc. Accellion’s services were used by Kroger, as well as many other companies, for third-party secure file transfers.

An Insight into the Incident

Kroger customers and associates were affected by the Accellion data security incident. Accellion notified Kroger that an unauthorized person gained access to certain Kroger files by exploiting a vulnerability in Accellion’s file-transfer service.

The incident did not affect Kroger’s IT systems or any grocery store systems or data. No credit or debit card (including digital wallet) information or customer account passwords were affected by this incident.

Kroger discontinued the use of Accellion’s services after the incident’s effect on January 23, 2021. The company reported the incident to federal law enforcement and initiated its forensic investigation to review the potential scope and impact of the incident.

Information may have been Involved

Based on the information provided by Accellion and investigation, Kroger believes the categories of affected data may include certain associates’ HR data, certain pharmacy records, and certain money services records.

What Actions is Kroger taking to respond to this Incident?

Kroger has no indication of fraud or misuse of personal information as a result of this incident. However, Kroger is directly notifying potentially impacted customers and associates through mail notices and offering free comprehensive credit monitoring to those individuals out of an abundance of caution.

Accellion Attacks have an Extensive Impact

Accellion has more than 3,000 customers worldwide. It is said that the affected product was 20 years old and nearing the end of its life. The company said on Feb. 1 that it had patched all known FTA vulnerabilities.

In mid-December, Accellion disclosed that they learned of an actively exploited zero-day vulnerability in their FTA secure file-transfer service. Threat actors exploited this vulnerability to steal data from companies who utilized the service to communicate with customers and partners securely.

Other Accellion customers affected by the hack include the University of Colorado, Washington State’s auditor, Australia’s financial regulator, the Reserve Bank of New Zealand, and the prominent U.S. law firm Jones Day.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Also Read

Yandex Data Breach – Employee Caught Selling Access to User Accounts

Antivirus Firm Exposed Internal Log data Generated by their Products

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers

Cado Security Labs has identified a sophisticated cryptomining campaign exploiting misconfigured Jupyter Notebooks, targeting...

AWS SNS Exploited for Data Exfiltration and Phishing Attacks

Amazon Web Services' Simple Notification Service (AWS SNS) is a versatile cloud-based pub/sub service...

Edimax Camera RCE Vulnerability Exploited to Spread Mirai Malware

A recent alert from the Akamai Security Intelligence and Response Team (SIRT) has highlighted...

Cisco Warns of Critical IOS XR Vulnerability Enabling DoS Attacks

Cisco has issued a security advisory warning of a vulnerability in its IOS XR...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

86,000+ Healthcare Staff Records Exposed Due to AWS S3 Misconfiguration

A non-password-protected database belonging to ESHYFT, a New Jersey-based HealthTech company, was recently discovered...

Telecom Giant NTT Confirms Data Breach Affecting 18,000 Corporate Customers

Japanese telecom giant NTT Communications (NTT Com) has confirmed a data breach that compromised...

260 Domains Hosting 5,000 Malicious PDFs to Steal Credit Card Data

Netskope Threat Labs uncovered a sprawling phishing operation involving 260 domains hosting approximately 5,000...