Dunkin’

Original Release Date: 12/4/2018

Summary

Dunkin’ announced that a third-party obtained access to some DD Perks accounts using usernames and passwords disclosed in data breaches at other companies, known as a credential stuffing attack. If accountholders used the same credentials for their DD Perks account that were exposed in a previous breach, the threat actors were able to gain access to their account, revealing customers’ first and last names, addresses, and account numbers. Dunkin’ forced a password reset to all potentially affected accountholders. It is important to immediately change passwords that have been disclosed in a breach, as well as passwords for any other accounts that share the same credentials. It is highly recommended to avoid reusing passwords across multiple accounts and enable multi-factor authentication where available to prevent credential stuffing attacks.

New Jersey Cybersecurity & Communications Integration Cell

2 Schwarzkopf Dr, Ewing Township, NJ 08628

njccic@cyber.nj.gov

OUR COMMITMENT

The NJCCIC is a component organization within the New Jersey Office of Homeland Security and Preparedness. We are the State's one-stop-shop for cyber threat analysis, incident reporting, and information sharing and are committed to making New Jersey more resilient to cyber threats by spreading awareness and promoting the adoption of best practices.

Agency Seals of State of NJ, NJOHSP and NJCCIC

STAY CONNECTED:

View our Privacy Policy here.

View our Site Index here.