CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

HungerRush extortion campaign targets restaurant customers

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A threat actor is mass-emailing restaurant patrons using the HungerRush POS platform, claiming to have access to customer and restaurant data. The attacker demands a response from HungerRush or threatens to expose the data. The emails were sent using Twilio SendGrid, a service previously used by HungerRush for legitimate communications. The attacker claims to have access to millions of customer records, including names, emails, passwords, addresses, phone numbers, dates of birth, and credit card information. HungerRush has not confirmed a breach, but customers are advised to be vigilant for potential phishing attempts.

Timeline

  1. 04.03.2026 20:44 1 articles · 3h ago

    HungerRush customers receive extortion emails from threat actor

    A threat actor began sending extortion emails to restaurant patrons using the HungerRush POS platform early Wednesday morning. The emails claim to have access to millions of customer records and threaten to expose the data if HungerRush does not respond. The emails were sent using Twilio SendGrid, a service previously used by HungerRush for legitimate communications. Infostealer logs suggest a HungerRush employee's device was infected in October 2025, leading to the compromise of corporate credentials.

    Show sources

Information Snippets