Incident: Data Breach at DoorDash Due to Vendor Phishing Attack

Published Date: 2022-08-26

Postmortem Analysis
Timeline 1. The software failure incident, which was a data breach affecting DoorDash customers and delivery workers, happened on an unspecified date as per the article [131326].
System 1. Third-party vendor's computer network 2. Employee credentials 3. DoorDash's internal tools
Responsible Organization 1. Cybercriminals who conducted the phishing attack against the third-party vendor, leading to the data breach at DoorDash [131326].
Impacted Organization 1. Customers of DoorDash 2. Delivery workers of DoorDash 3. Third-party vendor of DoorDash [Cited Article: 131326]
Software Causes 1. Phishing attack against a third-party vendor's computer network, leading to the theft of employee credentials and access to internal tools [131326]
Non-software Causes 1. Phishing attack against a company DoorDash does business with [131326]
Impacts 1. Personal information of DoorDash customers and delivery workers compromised, including names, email addresses, delivery addresses, and phone numbers [131326]. 2. A smaller number of customers had basic order data and partial payment card information stolen [131326]. 3. Names, phone numbers, and email addresses of DoorDash delivery workers were also stolen [131326]. 4. Full credit card numbers and account passwords were not compromised [131326].
Preventions 1. Implementing multi-factor authentication for all employees and vendors accessing internal tools could have prevented the software failure incident [131326]. 2. Conducting regular security awareness training to educate employees and vendors about phishing attacks and how to identify and report them could have helped prevent the breach [131326]. 3. Enhancing monitoring and detection capabilities to quickly identify unusual and suspicious activities within the network could have potentially prevented the data breach [131326].
Fixes 1. Implementing multi-factor authentication for all employees and vendors to prevent unauthorized access to internal tools [131326]. 2. Conducting regular security training and awareness programs to educate employees and vendors about phishing attacks and how to identify them [131326]. 3. Enhancing monitoring and detection capabilities to quickly identify unusual and suspicious activities within the network [131326]. 4. Regularly reviewing and updating security protocols and measures to stay ahead of evolving cyber threats [131326].
References 1. DoorDash's website notice [131326]

Software Taxonomy of Faults

Category Option Rationale
Recurring multiple_organization (a) The software failure incident related to a data breach at DoorDash does not mention any previous similar incidents happening again within the same organization. (b) The article does mention that the phishing attack against the vendor appears to be part of a larger campaign that has targeted other companies as well, drawing the attention of law enforcement. This indicates that similar incidents have happened at multiple organizations as part of a broader phishing campaign [131326].
Phase (Design/Operation) design (a) The software failure incident in this case can be attributed to the design phase. The breach at DoorDash occurred due to a phishing attack against a third-party vendor, which led to the compromise of employee credentials and subsequent access to DoorDash's internal tools [131326]. This indicates that the contributing factors introduced by the system development, specifically the vendor's network security vulnerabilities, played a significant role in the incident.
Boundary (Internal/External) within_system, outside_system (a) within_system: The software failure incident, in this case, the data breach at DoorDash, was primarily caused by a phishing attack that compromised a third-party vendor's computer network, leading to the theft of customer and delivery worker information. DoorDash mentioned that the breach was detected after unusual and suspicious activity was observed within the vendor's network, indicating that the failure originated from within the system [131326]. (b) outside_system: The software failure incident, specifically the data breach at DoorDash, was also influenced by factors originating from outside the system. The breach was initiated by a phishing attack against a company DoorDash does business with, highlighting how external threats can impact the security and integrity of a system [131326].
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident in this case occurred due to non-human actions, specifically a phishing attack against a third-party vendor that resulted in the compromise of employee credentials and subsequent unauthorized access to DoorDash's internal tools. This non-human action of the phishing attack allowed cybercriminals to steal information and compromise the security of DoorDash's systems [131326]. (b) Human actions also played a role in this incident as the cybercriminals behind the phishing attack were able to exploit human vulnerabilities within the third-party vendor's organization to gain access to employee credentials. Additionally, DoorDash took human-initiated actions in response to the breach, such as cutting off the vendor's access to its system, containing the incident, boosting security measures, and cooperating with law enforcement in the investigation [131326].
Dimension (Hardware/Software) software (a) The software failure incident in the DoorDash data breach was not directly attributed to hardware issues. The breach stemmed from a phishing attack against a third-party vendor, leading to the compromise of employee credentials and subsequent unauthorized access to DoorDash's internal tools [131326]. This indicates that the failure originated from a security vulnerability in the software systems rather than hardware issues.
Objective (Malicious/Non-malicious) malicious (a) The software failure incident in this case is malicious. The incident involved a data breach at DoorDash that stemmed from a phishing attack against a third-party vendor. Cybercriminals used a sophisticated phishing attack to steal employee credentials, allowing them to access DoorDash's internal tools and compromise the personal information of customers and delivery workers [Article 131326].
Intent (Poor/Accidental Decisions) unknown The software failure incident reported in Article #131326 was not directly related to poor decisions or accidental decisions. Instead, it was a result of a data breach caused by a sophisticated phishing attack targeting a third-party vendor associated with DoorDash. The cybercriminals were able to steal employee credentials through the phishing attack, leading to the compromise of customer and delivery worker information. The incident was not attributed to poor or accidental decisions made by the company.
Capability (Incompetence/Accidental) accidental (a) The software failure incident in the DoorDash data breach was not attributed to development incompetence. The breach was a result of a phishing attack against a third-party vendor that led to the compromise of employee credentials, allowing cybercriminals to access DoorDash's internal tools [131326]. (b) The software failure incident in the DoorDash data breach was accidental in nature. The breach occurred as a result of a sophisticated phishing attack that targeted a third-party vendor, leading to the unauthorized access of DoorDash's system. This incident was not intentional but rather a result of cybercriminals exploiting vulnerabilities through phishing tactics [131326].
Duration temporary The software failure incident reported in Article 131326 was temporary. It was caused by a phishing attack against a third-party vendor that resulted in the compromise of employee credentials, leading to unauthorized access to DoorDash's internal tools. DoorDash took immediate action by cutting off the vendor's access, containing the incident, and enhancing security measures to prevent similar incidents in the future. This incident was not a permanent failure but rather a temporary disruption caused by specific circumstances [131326].
Behaviour other (a) crash: The article does not mention a system crash as the cause of the software failure incident. (b) omission: The software failure incident in this case was not due to the system omitting to perform its intended functions at an instance(s). (c) timing: The software failure incident was not related to the system performing its intended functions correctly, but too late or too early. (d) value: The software failure incident was not due to the system performing its intended functions incorrectly. (e) byzantine: The software failure incident does not align with the system behaving erroneously with inconsistent responses and interactions. (f) other: The software failure incident in this case was a data breach resulting from a phishing attack against a third-party vendor, leading to the compromise of personal information of DoorDash customers and delivery workers.

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property (d) property: People's material goods, money, or data was impacted due to the software failure The software failure incident at DoorDash resulted in the compromise of personal information of some customers and delivery workers. Stolen data included customer names, email addresses, delivery addresses, phone numbers, basic order data, and partial payment card information. Additionally, the names, phone numbers, and email addresses of DoorDash delivery workers were also obtained by the cybercriminals [131326].
Domain information, health (a) The failed system in this incident was related to the information industry, specifically the food delivery service sector. DoorDash, a food delivery company, experienced a data breach that compromised the personal information of some of its customers and delivery workers [131326]. The incident involved the theft of customer names, email addresses, delivery addresses, phone numbers, basic order data, and partial payment card information. The breach stemmed from a phishing attack against a third-party vendor that DoorDash does business with, highlighting the vulnerability of systems in the information industry.

Sources

Back to List