889 employees
Starbucks Corporation has disclosed a data breach that compromised the sensitive personal and financial information of 889 of its employees (referred to as "partners"). The incident resulted from a phishing campaign that successfully harvested credentials for the company's internal "Partner Central" portal. The unauthorized access took place between January 19 and February 11, 2026. After discovering the suspicious activity on February 6, Starbucks, with the help of external experts, eradicated the threat from its systems. The compromised data includes Social Security numbers and bank account details. The company has emphasized that the breach was contained to the employee portal and did not impact any customer information. Affected employees are being offered 24 months of complimentary identity protection services.
The attack was a classic credential phishing campaign. Threat actors created websites that convincingly impersonated the legitimate Starbucks "Partner Central" login page. Phishing emails were then sent to Starbucks employees, luring them to these fake sites where they were prompted to enter their login credentials. Once the attackers harvested a valid username and password, they used them to log into the real portal and access the employee's personal information.
The extended duration of access, from January 19 to February 11, suggests that the attackers may have been accessing accounts intermittently to avoid detection, or that the company's monitoring systems did not immediately flag the anomalous logins.
The attack chain followed a standard phishing-to-breach methodology:
T1566.002 - Spearphishing Link).T1598.003 - Spearphishing via Service).T1078 - Valid Accounts).While the number of affected individuals (889) is relatively small compared to other major breaches, the impact on those employees is severe. The exposure of Social Security numbers combined with financial account and routing numbers puts them at extremely high risk for:
For Starbucks, the incident is a blow to its internal security posture and trust with its employees. While no customer data was involved, the breach of sensitive employee data still carries reputational risk and the direct costs of the investigation, remediation, and identity protection services.
Starbucks detected suspicious activity on February 6, nearly three weeks after the unauthorized access began. This indicates a potential delay in detecting the anomalous logins. Once detected, the company engaged external experts and reports that it took five days to fully contain the incident and remove the attackers' access. The company has notified law enforcement and is providing identity protection services through Experian to the affected employees.
New details reveal the Starbucks data breach was a supply chain attack, compromising a third-party vendor's access to Partner Central, not direct employee phishing.
Further investigation into the Starbucks data breach affecting 889 employees has revealed that the incident was not a direct phishing attack on Starbucks' own staff. Instead, threat actors successfully compromised a third-party business partner through a phishing campaign. The attackers then leveraged the vendor's legitimate access to the Starbucks Partner Central portal to exfiltrate sensitive employee data, including SSNs and financial details. This clarifies the attack vector as a supply chain compromise, highlighting the risks associated with third-party access to internal systems. The impact on affected employees remains severe, with high risk of identity theft and financial fraud.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats