DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

NY Attorney General James Gets Dunkin’ to Fill Holes in Security, Reimburse Hacked Customers

Posted on September 15, 2020 by Dissent

New York Attorney General Letitia James today announced a settlement with Dunkin’ Brands, Inc. (Dunkin’) — franchisor of Dunkin’ Donuts — resolving a lawsuit over the company’s failure to respond to successful cyberattacks that compromised tens of thousands of customers’ online accounts. The settlement requires the company to notify customers impacted in the attacks, reset those customers’ passwords, and provide refunds for unauthorized use of customers’ stored value cards. Dunkin’ will also be required to maintain safeguards to protect against similar attacks in the future, follow incident response procedures when an attack occurs, and pay $650,000 in penalties and costs to the state of New York.

“For years, Dunkin’ hid the truth and failed to protect the security of its customers, who were left paying the bill,” said Attorney General James. “It’s time to make amends and finally fill the holes in Dunkin’s’ cybersecurity. Not only will customers be reimbursed for lost funds, but we are ensuring the company’s dangerous brew of lax security and negligence comes to an end. My office is committed to protecting consumer data and holding all businesses accountable for implementing safe security practices.”

Attacks on Thousands of Consumers’ Accounts

Beginning in early 2015, Dunkin’ customers’ online accounts were targeted in a series of “credential stuffing attacks” — repeated, automated attempts to gain access to accounts using usernames and passwords stolen through security breaches of other unrelated websites or online services. In a matter of months, tens of thousands of customer accounts were compromised. Many of these accounts held Dunkin’-branded stored value cards — known as “DD cards” — which could be used to make purchases at Dunkin’ stores. An attacker that gained access to one of these accounts would have been able to use the DD card to make purchases, or remove the card from the account and sell it online. As a result of these attacks, tens of thousands of dollars on customers’ DD cards were stolen.

Dunkin’ was repeatedly alerted to attackers’ ongoing attempts to log in to customer accounts by a third-party app developer. The app developer even provided Dunkin’ with a list of nearly 20,000 accounts that had been compromised by attackers over just a sample five-day period. Yet, Dunkin’ failed to conduct an investigation into the attacks to identify other customer accounts that had been compromised, determine what customer information had been acquired, or whether customer funds had been stolen. Moreover, Dunkin’ did nothing to protect the nearly 20,000 customers that it knew had been impacted in the attacks or the potentially thousands more they did not know about. Among other missteps, Dunkin’ failed to notify these customers of unauthorized access to their accounts, reset their account passwords to prevent further unauthorized access, or freeze their DD cards.

Additionally, after learning of the attacks, Dunkin’ failed to implement appropriate safeguards to protect customers against future attacks through the Dunkin’ mobile app. The attacks continued for years.

Attorney General James filed a complaint last September, alleging that Dunkin’ violated New York’s data breach notification statute — General Business Law § 899-aa — by failing to notify consumers and New York state authorities of the data breach. The lawsuit also alleged that Dunkin’ violated New York’s consumer protection laws — including Executive Law § 63(12), and General Business Laws §§ 349 and 350 — by misrepresenting to consumers that it used reasonable safeguards to protect customers’ personal information.

Over the course of this past year’s litigation, the Office of the Attorney General (OAG) discovered thousands of additional customer accounts that appeared to have been compromised through credential stuffing attacks between 2015 and 2018.

Settlement Requires Notice, Refund to Impacted Customers, and Enhanced Data Security Practices

Under the terms of the settlement, Dunkin’ is required to take the following steps to notify, protect, and refund New York customers impacted in credential stuffing attacks:

  • Customers who had a registered DD card: To the extent it has not already done so, Dunkin’ will reset the password of each New York customer impacted in an attack who had a DD card registered to their account at the time and notify these customers that their accounts were, or may have been, accessed. Dunkin’ will also notify these customers that they are eligible for a refund for any fraudulent activity that resulted from an attack.
    Customers will have 90 days to contact Dunkin’ by calling (800) 447-0013 or by emailing [email protected] to request copies of their account records and report fraudulent activity.
  • Customers who did not have a registered DD card: To the extent it has not already done so, Dunkin’ will reset the password of each New York customer impacted in an attack who did not have a DD card registered to their account at the time and inform the customer that their account was, or may have been, accessed.

Dunkin’ will also be required to maintain reasonable safeguards to protect against future credential stuffing attacks. Additionally, in the future, Dunkin’ must follow incident response procedures when an attack occurs, which would include conducting a reasonable investigation to identify customer accounts that may have been compromised, and — in situations where customers have been impacted in an attack — resetting their passwords, providing notice, and transferring their account balances to new stored value card accounts.

Finally, Dunkin’ will pay $650,000 in penalties and costs to the state of New York.

Today’s settlement and all provisions of it are subject to court approval.

New York’s Data Security Laws Require Appropriate Safeguards, Incident Response Policies to Address Credential Stuffing Attacks

Credential stuffing has quickly become one of the most common forms of online attack. To comply with New York’s data security laws, businesses that maintain New Yorkers’ private information must take steps to address this growing threat.

  • Implement reasonable safeguards to address credential stuffing attacks: New York’s safeguards law — General Business Law § 899-bb — requires that businesses maintain reasonable safeguards to protect New York residents’ private information. These safeguards should include appropriate measures to mitigate well-known attack vectors, including credential stuffing.
  • Develop appropriate incident response procedures for credential stuffing attacks: New York’s safeguards law also requires that businesses develop and implement appropriate incident response procedures. These procedures may include conducting a reasonable investigation to identify customers impacted in a credential stuffing attack and taking appropriate action to protect those impacted customers, such as resetting customers’ passwords, freezing customers’ accounts, or alerting customers to a compromised account. New York’s data breach notification law — General Business Law § 899-aa — may also require notifying customers whose private information has been accessed or acquired in a credential stuffing attack.

This matter was handled by Assistant Attorneys General Johanna Skrzypczyk and Ezra Sternstein, Senior Enforcement Counsel Jordan Adler, Volunteer Assistant Attorney General Nathaniel Kosslyn, Legal Assistant Richard Borgia, Internet Technology Analyst Joe Graham, Deputy Bureau Chief Clark Russell, and Bureau Chief Kim Berger — all of the Bureau of Internet and Technology, with special assistance from Director Jonathan Werberg of the Research and Analytics Department. The Bureau of Internet and Technology is a part of the Division for Economic Justice, which is overseen by Chief Deputy Attorney General Chris D’Angelo and First Deputy Attorney General Jennifer Levy.

Source: NY Attorney General’s Office

Category: Business SectorCommentaries and AnalysesOf Note

Post navigation

← Two Alleged Hackers Charged with Defacing Websites Following Killing of Qasem Soleimani
“LockBit” Launches Ransomware Blog, Blackmails Two Companies →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices
  • Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations
  • Breachforums Boss “Pompompurin” to Pay $700k in Healthcare Breach
  • HHS Office for Civil Rights Settles HIPAA Cybersecurity Investigation with Vision Upright MRI
  • Additional 12 Defendants Charged in RICO Conspiracy for over $263 Million Cryptocurrency Thefts, Money Laundering, Home Break-Ins
  • RIBridges firewall worked. But forensic report says hundreds of alarms went unnoticed by Deloitte.
  • Chinese Hackers Hit Drone Sector in Supply Chain Attacks
  • Coinbase says hackers bribed staff to steal customer data and are demanding $20 million ransom
  • $28 million in Texas’ cybersecurity funding for schools left unspent
  • Cybersecurity incident at Central Point School District 6

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law
  • CFPB Quietly Kills Rule to Shield Americans From Data Brokers
  • South Korea fines Temu for data protection violations
  • The BR Privacy & Security Download: May 2025
  • License Plate Reader Company Flock Is Building a Massive People Lookup Tool, Leak Shows
  • FTC dismisses privacy concerns in Google breakup

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.