Breaking

Yum! Brands ransomware attack affects KFC, Taco Bell and Pizza Hut

The famous fast-food brands KFC, Taco Bell, Pizza Hut and the Habit Burger Grill owned by Yum! Brands have been a victim of ransomware attacks that have forced the brands to close 300 stores in the United Kingdom.

In total, all these brands operate 53,000 outlets across 155 countries, with $5 billion in assets and $1.3 billion in annual profit.

“Promptly upon detection of the incident, the Company initiated response protocols, including deploying containment measures such as taking certain systems offline and implementing enhanced monitoring technology,” explained Yum!! Brands in a press statement.

Yum! Brands ransomware attack and the impact on the outlets

Yum! Brands have initiated a detailed investigation into the incident by contacting the industries best cybersecurity and forensics entities. It has also notified Federal Law Enforcement about the attack. Though there was an initial disruption to the outlets, later the restaurants started normally operating without any problems.

It is suspected that the Ransomware Operators were able to steal data from those outlet databases and extort the same for further attack. However, Yum! Brands claim otherwise as there is no evidence of data extortion.

Yum! brands ransomware attack

Yum! Brands ransomware attack didn’t affect investors

“Although data was taken from the company’s network and an investigation is ongoing, at this stage, there is no evidence that customer databases were stolen,” reads the Yum!! Brands announcement.

As per the Securities and Exchange Commission (SEC) 8-K form, Yum! Brands ransomware attack will have no effect on the investors or their investments.

“While this incident caused temporary disruption, the company is aware of no other restaurant disruptions and does not expect this event to have a material adverse impact on its business, operations or financial results,” mentions the firm’s SEC report.

The Cybersecurity Times have reached out to Yum! Brands to learn more about when the ransomware attack, the loophole that was manipulated, company networks that were affected and details on the downtime. Meanwhile, if you want to secure your network against such threats, please start employing right endpoint security tools for your business to keep your data safe.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter.

You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.

Share the article with your friends
William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

Recent Posts

Best Microsoft Intune Alternatives: Top 5 MDMs to Consider

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

1 day ago

Top 7 Best Smartphones with Best Security Features in 2024

Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…

3 weeks ago

Top 11 Log Management Tools for Efficient System Management

Discover the top 11 log management tools for efficient system management and monitoring. Learn about…

2 months ago

Top 5 Threat Intelligence Tools For 2024

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

2 months ago

Privileged Access Management: 5 Best PAM Solutions in the Market

Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…

2 months ago

Apple Device Management: Top Solutions for iOS and macOS Management

Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…

2 months ago