Starbucks Discloses Data Breach Affecting 889 Employees via Phishing Attack

Phishing Campaign Against Starbucks' 'Partner Central' Portal Compromises Data of 889 Employees

MEDIUM
February 12, 2026
February 20, 2026
4m read
Data BreachPhishing

Impact Scope

People Affected

889 employees

Industries Affected

RetailHospitality

Geographic Impact

United States (national)

Related Entities(initial)

Other

ExperianStarbucks Corporation

Full Report(when first published)

Executive Summary

Starbucks Corporation has disclosed a data breach that compromised the sensitive personal and financial information of 889 of its employees (referred to as "partners"). The incident resulted from a phishing campaign that successfully harvested credentials for the company's internal "Partner Central" portal. The unauthorized access took place between January 19 and February 11, 2026. After discovering the suspicious activity on February 6, Starbucks, with the help of external experts, eradicated the threat from its systems. The compromised data includes Social Security numbers and bank account details. The company has emphasized that the breach was contained to the employee portal and did not impact any customer information. Affected employees are being offered 24 months of complimentary identity protection services.

Threat Overview

The attack was a classic credential phishing campaign. Threat actors created websites that convincingly impersonated the legitimate Starbucks "Partner Central" login page. Phishing emails were then sent to Starbucks employees, luring them to these fake sites where they were prompted to enter their login credentials. Once the attackers harvested a valid username and password, they used them to log into the real portal and access the employee's personal information.

The extended duration of access, from January 19 to February 11, suggests that the attackers may have been accessing accounts intermittently to avoid detection, or that the company's monitoring systems did not immediately flag the anomalous logins.

Technical Analysis

The attack chain followed a standard phishing-to-breach methodology:

  1. Reconnaissance: Attackers identified the URL and appearance of the legitimate "Partner Central" portal.
  2. Weaponization: They created imposter websites and crafted convincing phishing emails.
  3. Delivery: Phishing emails were sent to Starbucks employees (T1566.002 - Spearphishing Link).
  4. Exploitation (Social Engineering): Employees clicked the link and entered their credentials on the fake site (T1598.003 - Spearphishing via Service).
  5. Installation/Access: Attackers used the stolen credentials to log in to the legitimate portal (T1078 - Valid Accounts).
  6. Actions on Objectives: The attackers accessed and likely exfiltrated the sensitive PII and financial data available within the portal.

Impact Assessment

While the number of affected individuals (889) is relatively small compared to other major breaches, the impact on those employees is severe. The exposure of Social Security numbers combined with financial account and routing numbers puts them at extremely high risk for:

  • Identity Theft: Criminals can use this information to open new lines of credit, file fraudulent tax returns, or apply for loans.
  • Direct Financial Fraud: The bank account information could be used to attempt unauthorized electronic funds transfers.
  • Targeted Phishing: The attackers know the victims are Starbucks employees, which allows for highly convincing secondary phishing attacks.

For Starbucks, the incident is a blow to its internal security posture and trust with its employees. While no customer data was involved, the breach of sensitive employee data still carries reputational risk and the direct costs of the investigation, remediation, and identity protection services.

Data Exposed

  • Full Names
  • Social Security numbers (SSNs)
  • Dates of Birth
  • Financial account numbers
  • Bank routing numbers

Detection & Response

Starbucks detected suspicious activity on February 6, nearly three weeks after the unauthorized access began. This indicates a potential delay in detecting the anomalous logins. Once detected, the company engaged external experts and reports that it took five days to fully contain the incident and remove the attackers' access. The company has notified law enforcement and is providing identity protection services through Experian to the affected employees.

Mitigation

  1. Multi-Factor Authentication (MFA): The single most effective control that could have prevented this breach is the implementation of MFA on the "Partner Central" portal. Even with stolen credentials, the attackers would have been unable to log in without the second factor.
  2. Employee Security Training: Continuous training is needed to help employees recognize and report phishing attempts. This should include simulations of modern phishing techniques.
  3. Email Security: Deploy advanced email security solutions that can detect and block phishing links and impersonation attempts before they reach employee inboxes.
  4. Credential Breach Monitoring: Proactively monitor the dark web and criminal forums for compromised corporate credentials to detect breaches faster.
  5. Limit Data Exposure: Review the data available in internal portals like "Partner Central." Sensitive information like SSNs and bank account numbers should be masked or only accessible after an additional step-up authentication, if they need to be displayed at all.

Timeline of Events

1
January 19, 2026
Unauthorized access to employee accounts begins.
2
February 6, 2026
Starbucks becomes aware of suspicious activity.
3
February 11, 2026
Unauthorized access is fully contained.
4
February 12, 2026
This article was published

Article Updates

February 20, 2026

Severity increased

New details reveal the Starbucks data breach was a supply chain attack, compromising a third-party vendor's access to Partner Central, not direct employee phishing.

Further investigation into the Starbucks data breach affecting 889 employees has revealed that the incident was not a direct phishing attack on Starbucks' own staff. Instead, threat actors successfully compromised a third-party business partner through a phishing campaign. The attackers then leveraged the vendor's legitimate access to the Starbucks Partner Central portal to exfiltrate sensitive employee data, including SSNs and financial details. This clarifies the attack vector as a supply chain compromise, highlighting the risks associated with third-party access to internal systems. The impact on affected employees remains severe, with high risk of identity theft and financial fraud.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Data BreachPIIPhishingSSNStarbucks

📢 Share This Article

Help others stay informed about cybersecurity threats