Security

Krispy Kreme Doughnut Corporation admits to hole in security

Belly-busting biz says it's been hit by cowardly custards


Doughnut slinger Krispy Kreme has admitted to an attack that has left many customers unable to order online.

According to a mandatory 8-K filing [PDF], on November 29, the biz was notified regarding unauthorized access to a portion of its IT systems. Its security team waddled into action and sprinkled in support from "leading cybersecurity experts," but said that delays in online orders were going to be hard to swallow for some.

"The expected costs related to the incident, including the loss of revenues from digital sales during the recovery period, fees for our cybersecurity experts and other advisors, and costs to restore any impacted systems, are reasonably likely to have a material impact on the company’s results of operations and financial condition," it reported. "The company holds cybersecurity insurance that is expected to offset a portion of the costs of the incident."

The pastry purveyors remain tight-lipped about the nature of the incident. When asked if this was a straight-up ransomware attack, a data-theft incident, or a secondary ransomware extortion attempt that goes after customers, it declined to comment.

"We’re experiencing certain operational disruptions due to a cybersecurity incident, including with online ordering in parts of the United States. We immediately began taking steps to investigate, contain, and remediate the incident with the assistance of leading cybersecurity experts and other advisors," a spokesperson told The Register.

"We, along with them, continue to work diligently to respond to and mitigate the impact from the incident, including the restoration of online ordering. Our fresh doughnuts are available in our shops as always! Additionally, our fans can also visit their nearest grocery or convenience store to enjoy our doughnuts."

The filing does appear to be a little late. The SEC requires companies to report "material" cybersecurity incidents within four business days, which suggests Krispy Kreme's disclosure might be a little late out of the oven. Again, the company has no comment on the issue.

But the timing of the attack is certainly interesting. The US celebrated its Thanksgiving holiday on November 28 this year. With IT staff enjoying a break and incident response times slowed, holidays are an ideal time to hit servers, and there's also a marked increase in general computer crime, for example the 2023 MOVEit intrusion was timed for America's Memorial Day weekend.

As ever, if you're a regular customer, check any credit cards associated with your bun account. A cholesterol check might be in order too. ®

Send us news
33 Comments

How nice that state-of-the-art LLMs reveal their reasoning ... for miscreants to exploit

Blueprints shared for jail-breaking models that expose their chain-of-thought process

US Cyber Command reportedly pauses cyberattacks on Russia

PLUS: Phishing suspects used fishing gear as alibi; Apple's 'Find My' can track PCs and Androids; and more

Qualcomm pledges 8 years of security updates for Android kit using its chips (YMMV)

Starting with Snapdragon 8 Elite and 'droid 15

Microsoft expands Copilot bug bounty targets, adds payouts for even moderate messes

Said bugs 'can have significant implications' – glad to hear that from Redmond

Drug-screening biz DISA took a year to disclose security breach affecting millions

If there's something nasty on your employment record, extortion scum could come calling

Check out this free automated tool that hunts for exposed AWS secrets in public repos

You can find out if your GitHub codebase is leaking keys ... but so can miscreants

C++ creator calls for help to defend programming language from 'serious attacks'

Bjarne Stroustrup wants standards body to respond to memory-safety push as Rust monsters lurk at the door

Malware variants that target operational tech systems are very rare – but 2 were found last year

Fuxnet and FrostyGoop were both used in the Russia-Ukraine war

Ivanti endpoint manager can become endpoint ravager, thanks to quartet of critical flaws

PoC exploit code shows why this is a patch priority

Bybit declares war on North Korea's Lazarus crime-ring to regain $1.5B stolen from wallet

Up to $140M in bounty rewards for return of Ethereum allegedly pilfered by hermit nation

100-plus spies fired after NSA internal chat board used for kinky sex talk

National intel boss slams naughty nattering on work systems as 'egregious violation of trust'

Ghost ransomware crew continues to haunt IT depts with scarily bad infosec

FBI and CISA issue reminder - deep sigh - about the importance of patching and backups