CRITICAL SEVERITYFood Delivery

EatStreet Data Breach

EatStreet Food Ordering Service Breach (2019): 6.4 Million Customer Records Including Full Credit Card Data Exposed

Online food ordering and delivery platform.

Verified by ObscureIQ Intelligence

9.5Severity
6.4MRecords
10Fields
2019Year

ObscureIQ Breach Intelligence Scores
6.3
Breach Risk Index
18
Data Value
25
Market Recency
419
days
Since Breach

Risk Interpretation

Exposure enables phishing, order fraud, delivery impersonation, and household targeting. Address and order patterns can also reveal routines and consumption habits.

🎯 Impact & Downstream Threats

The institutional impact on EatStreet has been moderate given the marketplace's three-sided affected population and the inclusion of full credit card and bank account data for affected subsets. EatStreet incurred costs associated with the external forensics investigation, breach notification across U.S. state regulatory frameworks, system security enhancements, and credit card payment processor coordination. The company filed breach notifications with multiple U.S. state attorneys general includ

Primary downstream threats:
  • Credential stuffing against reused passwords across other platforms
  • Financial fraud using exposed financial profile data
  • Identity verification bypass using name + date of birth combination
  • SIM swap attacks where phone numbers are present
  • Targeted phishing campaigns using exposed email addresses
  • Doxxing risk from physical address exposure
  • Social media account targeting and impersonation

🔓 Threat Vectors

Card-present & card-not-present fraud
Card identification & social engineering
Identity verification bypass
Phishing, credential stuffing & account takeover
Name-based social engineering
Profile enrichment
Credential stuffing & account takeover
SIM swapping, vishing & SMS phishing
Physical stalking, mail fraud & identity verification
Account impersonation & social graph harvesting

📋 Breach Intelligence

EntityEatStreet
OrganizationPrivate Company • USA
Breach Date2019-05-03
Disclosure2019-06-14
DBC Added2025-03-04
Added Date2025-03-04
Records~6.4M (6,399,913 records)
Attack VectorMisconfiguration
Threat ActorGnosticPlayers
Data SubjectsCustomer: Direct
Breach PathwayDirect
SourceHave I Been Pwned / DataBreach.com / ObscureIQ
SensitivityStandard
CA Reported2019-06-14
Breach ID440;441
StatusConfirmed

📝 Executive Summary

EatStreet, a U.S.-based online food ordering and delivery marketplace, suffered a data breach beginning May 3, 2019 when an unauthorized third party gained access to EatStreet's database. EatStreet detected the intrusion on May 17, 2019, terminated the unauthorized access, and engaged an external information-technology forensics firm to investigate. The breach has been attributed to the GnosticPlayers hacker group, which was responsible for a series of high-profile breaches at consumer platforms during the 2019 period. EatStreet publicly disclosed the breach on June 14, 2019 and notified affected customers, restaurant partners, and delivery partners. The breach was redistributed and indexed by DataBreach.com on March 4, 2025.

The breach affected approximately 6.4 million records based on records indexed by Have I Been Pwned and DataBreach.com, spanning three distinct affected populations. For consumer customers, compromised fields included names, email addresses, phone numbers, physical addresses, dates of birth, gender, social media profile linkages, and passwords stored as bcrypt hashes. For most affected customers, payment card data exposure was limited to partial credit card information; however, for a limited number of customers who used the EatStreet platform during the intrusion window, the attacker accessed full payment card information including credit card numbers, expiration dates, card verification codes (CVV), and billing addresses. For restaurant partners and delivery partners, compromised fields included business and individual names, addresses, phone numbers, email addresses, bank account numbers, and routing numbers used for marketplace payouts.

For affected individuals, the practical risk profile varies substantially across the three affected populations and is most severe for the limited subset of customers whose full payment card data was exposed and for restaurant and delivery partners whose bank account and routing numbers were exposed. Affected customers in the full-card-data subset face direct payment card fraud risk and should monitor card statements, request replacement cards, and dispute any unauthorized charges. Restaurant and delivery partners face direct bank account fraud risk because exposed bank account and routing numbers can be used to initiate ACH withdrawals or to support synthetic identity fraud, and these partners should consider establishing bank account fraud alerts or, in higher-risk cases, opening replacement accounts. The combination of name, date of birth, email, phone, and physical address for the broader customer population supports identity-fraud and credential-stuffing attacks against other accounts where the EatStreet password was reused. All affected individuals should change reused passwords on other accounts, enable two-factor authentication where available, and monitor financial accounts and credit reports for unauthorized activity.

🏢 About EatStreet

EatStreet was a U.S.-based online food ordering and delivery marketplace, headquartered in Madison, Wisconsin. The platform operated as a multi-sided marketplace connecting consumers with restaurants and independent delivery partners across U.S. metropolitan markets, with online and mobile ordering supported by EatStreet's own delivery network and through restaurant-managed delivery. As an account-based marketplace operator, EatStreet maintained substantial data across three distinct populations: consumer customers including identity, contact information, ordering history, and payment card data; restaurant partners including business information, addresses, and bank account and routing data used for marketplace payouts; and delivery partners including identity, contact information, and bank account information used for delivery-fee disbursement.

Platform | Online food ordering and delivery | Marketplace + logistics network | USA
Private CompanyUSAeatstreet.com

🗂 Why They Hold Your Data

Food-ordering platforms collect customer identity, phone numbers, addresses, payment-adjacent data, order history, and restaurant interactions across marketplace and delivery workflows.

📰 Recent Developments

EatStreet has continued to operate following the 2019 breach. Following the breach disclosure on June 14, 2019, EatStreet announced multiple security enhancements including reinforced multi-factor authentication, credential-key rotation, and review and update of coding practices. EatStreet engaged an external information-technology forensics firm to investigate the incident and audit its systems for additional unauthorized access. EatStreet sent breach notification letters to affected customers, restaurant partners, and delivery partners and notified credit card payment processors. The breach was redistributed and indexed by DataBreach.com on March 4, 2025 as part of the broader 2024 to 2025 historical-breach indexing wave. EatStreet has continued to operate the food ordering platform without public disclosure of subsequent security incidents.

🔍 Data Points Exposed

10 verified field types:
Email
Phone Number
Name
Credit Card;Dates of birth
Email
Genders
Names
Partial credit card data
Passwords
Phone numbers
Physical addresses
Social media profiles

Exposure Categories

LocationPHYS ADDR
FinancialCCARD PARTIAL

Canonical Fields

credit_card, credit_card:partial, date_of_birth, email_address, full_name, gender, password, phone_number, physical_address, social_media_profile

🌐 Dark Web Verification

Confirmed
  • Dataset containing ~6.4M records identified in breach intelligence sources
  • Data indexed and searchable across breach notification platforms
  • Source: eat-street-2019;EatStreet Data Breach

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of EatStreet
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

MisconfigurationFood DeliveryEmailPhoneAddressPasswordsFinancial DataDOB

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom