DoorDash Details
DoorDash
San Francisco, California • employees • Retail
Industry
Retail
Security Incidents
1
DoorDash, Inc. is a San Francisco–based company that operates an online food ordering and food delivery platform. It trades under the symbol DASH. With a 56% market share, DoorDash is the largest food delivery company in the United States. It also has a 60% market share in the convenience delivery category.
Security Incidents
DoorDash Breach of May 2023
Show more
Severity Score
Significant
Type
3rd Party CompromiseSummary
In May 2023, DoorDash disclosed a data breach linked to the cyberattack on Twilio, exposing customer and employee data. The breach was tied to hackers who abused a third-party vendor's access to DoorDash's systems, gaining unauthorized entry. DoorDash did not specify the exact number of affected users but mentioned that a "small percentage" of users were impacted. The incident compromised the information of approximately 4.9 million customers, making it a significant breach for the food delivery company. DoorDash has taken steps to address the breach and has involved law enforcement officials ...Show more
Severity
The DoorDash cyber security incident of May 2023 was severe as it affected nearly 5 million users, exposing their information to hackers. The breach was linked to the OktaPus hackers who had previously targeted other organizations, indicating a sophisticated and coordinated attack. DoorDash took immediate steps to block the hackers and enhance its security measures to prevent future breaches.Impact
The breach impacted nearly 5 million DoorDash users, with some accounts having the last four digits of their credit cards accessed. While this information alone may not lead to fraudulent purchases, it still poses a risk to the affected users. DoorDash urged users to change their passwords immediately and reassured them that steps were taken to prevent further unauthorized access.KEEP YOUR ENVIRONMENT SECURE
Weak credentials are the leading cause of breaches. Beyond Identity can help.
See MFA exploits in action
Watch how adversaries exploit companies in quick videos