Food delivery giant DoorDash has confirmed a cybersecurity breach that exposed the personal information of an unspecified number of users, including customers, delivery workers, and merchants. According to the company, the data exposed in the breach included names, email addresses, phone numbers, and physical addresses, but not financial or government-issued identification data. The company emphasized that no evidence has surfaced indicating misuse of the compromised information for fraud or identity theft.
This latest incident was traced back to a social engineering attack targeting a single DoorDash employee.
The attacker successfully manipulated the employee into granting unauthorized access, circumventing technical defenses and gaining entry into DoorDash’s internal systems. Once detected, DoorDash quickly cut off the attacker’s access, launched a full investigation, and brought in both law enforcement and external cybersecurity experts to aid in the response and assessment of the breach.
Why It Matters: The DoorDash incident reflects a troubling and common trend in cybersecurity: breaches originating from human manipulation. Social engineering attacks, which exploit trust rather than technology, continue to be among the most effective methods for breaching even well-defended networks. As companies strengthen their technical safeguards, attackers are increasingly turning to the human element as the weakest link.
- What Was Breached: DoorDash confirmed that an unauthorized third party accessed user information, including full names, phone numbers, physical addresses, and email addresses. The breach did not include Social Security numbers, bank or payment card details, driver’s license numbers, or other sensitive identification data. While the leaked information doesn’t pose an immediate identity theft risk, it could be used in phishing campaigns or to support further social engineering.
- How It Happened: The breach stemmed from a social engineering attack in which a company employee was tricked into allowing system access. This tactic, which bypasses digital security layers, is an example of the reliance of threat actors on exploiting human error rather than technical flaws.
- Company Response Measures: Upon detecting the breach, DoorDash disabled the intruder’s access and began a thorough investigation. Law enforcement agencies were notified, and affected users were alerted. The company also retained external cybersecurity experts to aid in incident response, assess system vulnerabilities, and recommend improvements.
- Security Upgrades and Awareness Training: DoorDash is implementing enhanced detection and prevention systems to identify suspicious activities earlier. Additionally, the company is expanding its employee cybersecurity training with a focus on recognizing and responding to social engineering threats, a direct lesson learned from the attack.
- Previous Breach and Ongoing Risks: This marks the second major data breach in DoorDash’s history. In 2019, the company disclosed a breach affecting nearly 5 million users due to a vulnerability introduced by a third-party vendor. Unlike that incident, this breach was detected and contained relatively quickly, but it reinforces concerns about the company’s overall security posture and the industry-wide challenge of defending against human-targeted attacks.
DoorDash Confirms Data Breach After Hackers Access Users’ Personal Data – Cyber Press
Trusted insights for technology leaders
Our readers are CIOs, CTOs, and senior IT executives who rely on The National CIO Review for smart, curated takes on the trends shaping the enterprise, from GenAI to cybersecurity and beyond.
Subscribe to our 4x a week newsletter to keep up with the insights that matter.


