DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Pizza Hut Australia customer data hacked; ShinyHunters claims to have more than 1 million customers’ information

Posted on September 3, 2023 by Dissent

This has not been a great year for Australian citizens whose personal information has been compromised in a number of cyberattacks. Although DataBreaches regrets being the bearer of more bad news for them, more than one million customers of Pizza Hut Australia appear to have had their data acquired by ShinyHunters.

According to “Shiny” (@shinycorp), the group gained access 1-2 months ago via Amazon Web Services (AWS) using multiple entry points. They claim to have exfiltrated more than 30 million records with customers’ orders as well as information on more than 1 million customers.

Shiny states that they were never detected during the attack.

As proof of claims, DataBreaches was provided with two sample files. The sample file for orders contained 200,000 records with the following headers:

OrderId|OrderReference|ExternalReference|ChannelName|ChannelType|ApiUserId|ServiceType|CreatedAt|ChangedAt|OrderedAt|OrderDueAt|StoreId|StoreName|CustomerId|FirstName|LastName|EmailAddress|PhoneNumber|PostalCode|PaymentType|PaymentReference|PaymentResponse|BasketDetail|OrderDetail|WebHookUrl|Source|PosCustomerSequenceNumber|CustomerSequenceNumber|CheckNumber|CheckSequenceNumber|FullName|GesReminder|Status|CreatedAtDate|OrderDueAtDate|GesReminderRedirected|OrderShortId|GesCode|MobilePhone|OptinEmail|OptinSms|UserId|OrderNote|baskettotal

The second sample file was a json file containing 100,000 customers’ names, email addresses, postal addresses, longitude, mobile phone numbers, passwords, service type (delivery or pickup), and credit card numbers. The credit card data was encrypted and the passwords were hashed, but the other fields were all plaintext.

Spot-checking customer names, DataBreaches was able to verify that there were people with the customers’ names in the right geographic area for the data samples.

Shiny states that they are demanding $300,000.00 to delete all the data. ShinyHunters has a reputation for selling or leaking data when their victims don’t pay their extortion demands, and so far, Pizza Hut hasn’t responded to them at all.

Like many other chains, Pizza Hut Australia has franchises. Whether corporate handles data storage and security for the franchises as part of their contracts is unknown to DataBreaches at this point, but it seems likely given that one of the fields in the orders data is “StoreID.”

Pizza Hut Australia’s website notes that they do not offer any support by email, but with a little digging, DataBreaches obtained contact information for the firm’s CEO, CFO, and COO. Emails were sent to all three of them yesterday and two of them were also messaged on LinkedIn to tell them to check for email from this site. Questions put to them included asking them whether they had been aware that they had been hacked. DataBreaches also inquired whether they had notified law enforcement, regulators, or customers about the breach.

No reply has been received by publication, but this post will be updated as more information becomes available. There is currently no notice on Pizza Hut Australia’s website alerting customers to any data security incident that involves their credit card numbers.

Category: Breach IncidentsBusiness SectorHackNon-U.S.

Post navigation

← Update: Leak site with plastic surgery patients’ data and sexually explicit videos removed
In: 320,000 Patient Records From Ayush Jharkhand Gov Leaked on Hacking Forum →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices
  • Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations
  • Breachforums Boss “Pompompurin” to Pay $700k in Healthcare Breach
  • HHS Office for Civil Rights Settles HIPAA Cybersecurity Investigation with Vision Upright MRI
  • Additional 12 Defendants Charged in RICO Conspiracy for over $263 Million Cryptocurrency Thefts, Money Laundering, Home Break-Ins
  • RIBridges firewall worked. But forensic report says hundreds of alarms went unnoticed by Deloitte.
  • Chinese Hackers Hit Drone Sector in Supply Chain Attacks
  • Coinbase says hackers bribed staff to steal customer data and are demanding $20 million ransom
  • $28 million in Texas’ cybersecurity funding for schools left unspent
  • Cybersecurity incident at Central Point School District 6

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law
  • CFPB Quietly Kills Rule to Shield Americans From Data Brokers
  • South Korea fines Temu for data protection violations
  • The BR Privacy & Security Download: May 2025
  • License Plate Reader Company Flock Is Building a Massive People Lookup Tool, Leak Shows
  • FTC dismisses privacy concerns in Google breakup

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.