Hacker mass-mails HungerRush extortion emails to restaurant patrons
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。首先,我得仔细阅读文章,抓住主要信息。 文章讲的是HungerRush这个餐饮科技公司,他们使用的POS系统被黑客攻击。黑客给客户发了勒索邮件,威胁如果不回应就泄露数据。HungerRush声称有16000家餐厅使用他们的系统,包括一些知名连锁店。 然后,黑客发了两封邮件,第一封威胁不回应就采取恶意行动,第二封则详细列出泄露的数据内容,包括姓名、邮箱、密码、地址、电话号码、出生日期和信用卡信息。邮件使用了Twilio SendGrid发送,并通过了SPF、DKIM和DMARC认证,看起来很真实。 用户在Reddit上也报告收到了这些邮件,并且有人提到HungerRush的员工设备可能被恶意软件感染,导致凭证被盗。不过目前还不清楚这些凭证是否与此次攻击有关。 最后,建议使用HungerRush系统的餐厅客户警惕钓鱼邮件和短信。 总结的时候要注意控制字数,所以要提炼关键点:HungerRush被黑,黑客发勒索邮件威胁泄露数据,影响范围大,并且邮件看起来真实可信。同时提到员工设备可能被感染导致凭证被盗。 </think> HungerRush, a restaurant technology provider, faced a cyber threat where attackers sent extortion emails to customers, claiming access to millions of customer records including sensitive data. The emails, appearing legitimate due to domain authentication, escalated threats if HungerRush did not respond. The incident highlights potential vulnerabilities in the company's systems and raises concerns over data security for its 16,000+ restaurant clients. 2026-3-4 18:45:17 Author: www.bleepingcomputer.com(查看原文) 阅读量:2 收藏

HungerRush POS

Customers of restaurants using the HungerRush point-of-sale (POS) platform say they received emails from a threat actor attempting to extort the company, warning that restaurant and customer data could be exposed if HungerRush fails to respond.

HungerRush is a restaurant technology provider that offers point-of-sale (POS), online ordering, delivery management, and payment processing software to help restaurants manage orders, customer information, and business operations.

The company claims to work with over 16,000 restaurants, including Sbarro, Jet's Pizza, Fajita Pete's, Hungry Howie's, and many more.

Extortion emails sent to restaurant patrons

The attacker started sending the emails early Wednesday morning, with multiple recipients sharing samples with BleepingComputer.

The first email was sent from [email protected], prompting HungerRush to stop ignoring their extortion emails or it would put customer data at risk.

"You cannot ignore all my requests and expect me not to take malicious actions. You still have time," reads the email.

"Every restaurant and customer of said restaurants' data which is in the millions is in jeopardy here and I can't even get a response back. Not to worry, there's still time left."

A second email, sent three hours later from "[email protected]," escalates the threat, claiming that the attacker has access to data records for millions of customers that contain names, emails, passwords, addresses, phone numbers, dates of birth, and credit card information. 

Second extortion email sent to HungerRush clients' customers
Second extortion email sent to HungerRush clients' customers
Source: BleepingComputer

BleepingComputer's analysis of the email headers shows they were delivered using Twilio SendGrid, which customers have told BleepingComputer was previously used to send HungerRush restaurant receipts.

The emails were sent from o10.e.hungerrush.com (159.183.129.119), which resolves to infrastructure operated by Twilio SendGrid, a platform commonly used by companies to send transactional and marketing emails.

The email headers also confirm that the messages passed SPF, DKIM, and DMARC authentication checks for the hungerrush.com domain, as the company's SPF record, shown below, authorizes SendGrid to send emails on their behalf.

v=spf1 include:spf.protection.outlook.com include:_spf.salesforce.com include:mail.zendesk.com include:_spf.psm.knowbe4.com include:sendgrid.net include:4750273.spf01.hubspotemail.net -all

Numerous people on Reddit have reported receiving the emails, stating that past digital receipts from restaurants showed they used HungerRush's ordering or POS systems.

Alon Gal, co-founder and CTO of Hudson Rock, posted on LinkedIn that infostealer logs indicate a HungerRush employee's device was allegedly infected with an infostealer in October 2025, leading to the compromise of credentials.

According to Gal, the malware stole numerous corporate credentials, including those for the company's NetSuite, QuickBooks-related services, Stripe dashboards, Bill.com vendor payment systems, Visa Online commercial services, and Salesforce environments.

It is unclear if these stolen credentials are linked to the claimed breach at HungerRush.

BleepingComputer contacted HungerRush about the incident and asked whether the emails indicate a confirmed breach or unauthorized access to its systems.

For the time being, customers of restaurants using the HungerRush POS system should be on alert for potential phishing emails and SMS texts that abuse the potentially stolen information.

tines

Red Report 2026: Why Ransomware Encryption Dropped 38%

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.


文章来源: https://www.bleepingcomputer.com/news/security/hacker-mass-mails-hungerrush-extortion-emails-to-restaurant-patrons/
如有侵权请联系:admin#unsafe.sh