PROBABLYPWNED
Data BreachesMarch 14, 20264 min read

Starbucks Breach Exposes SSNs of 889 Employees via Phishing

Attackers compromised 889 Starbucks Partner Central accounts using fake login portals, exposing employee names, Social Security numbers, and bank details.

Sarah Mitchell

Starbucks disclosed a data breach affecting 889 employees after attackers gained access to their Partner Central HR portal accounts. The company began notifying affected individuals on March 10, revealing that personal data including Social Security numbers and bank account information was exposed.

What Happened

Threat actors created websites impersonating Starbucks Partner Central—the internal portal employees use to manage HR information, benefits, and payroll details. When employees logged into these fake sites, attackers captured their credentials.

With valid logins in hand, attackers accessed the real Partner Central accounts. According to Starbucks' disclosure, unauthorized access occurred between January 19 and February 11, 2026. Starbucks detected the breach around February 6 and completed its investigation before notifying affected employees in March.

Data Exposed

The breach exposed sensitive personal information:

  • Full names
  • Social Security numbers
  • Dates of birth
  • Financial account numbers
  • Bank routing numbers

This is a particularly bad combination. SSN plus bank account details provides everything needed for identity theft and financial fraud. Employees whose data was accessed face long-term risk.

How the Attack Worked

This wasn't a sophisticated infrastructure breach—it was credential phishing at scale. The attackers didn't need to compromise Starbucks' systems directly. They built convincing login portals, drove traffic to them (likely via email lures or search manipulation), and harvested credentials as employees entered them.

It's the same playbook we see repeatedly. The Storm-2561 VPN phishing campaign Microsoft disclosed this week uses identical techniques against enterprise VPN users. Attackers know credential harvesting works.

The January-February attack window suggests a sustained campaign rather than a single phishing blast. Attackers collected credentials over three weeks before Starbucks noticed.

Starbucks' Response

The company is offering affected employees:

  • 24 months of Experian IdentityWorks credit monitoring
  • Dark web surveillance for personal information
  • Identity restoration services
  • $1 million identity theft insurance

Standard breach response offerings, though the two-year monitoring period is longer than the typical one year many companies provide.

Starbucks conducted a joint investigation with external cybersecurity experts and implemented additional controls on Partner Central access. The company hasn't disclosed specific new security measures.

Questions Remaining

The disclosure leaves several questions unanswered:

Was MFA in place? If Partner Central required multi-factor authentication, attackers would have needed more than stolen passwords to access accounts. The breach suggests either MFA wasn't mandatory or attackers captured second factors as well.

How were employees directed to fake sites? Whether through targeted phishing emails, search engine manipulation, or other methods affects how employees should respond.

What monitoring detected the breach? Understanding detection mechanisms helps other organizations identify similar attacks in their environments.

Protecting Against HR Portal Phishing

For organizations with similar employee portals:

  1. Mandate MFA on all HR and payroll systems—credentials alone shouldn't grant access
  2. Implement phishing-resistant authentication where possible (FIDO2 keys, passkeys)
  3. Monitor for lookalike domains that impersonate your employee-facing sites
  4. Train employees to navigate directly to internal portals rather than clicking email links

For employees generally, recognizing phishing attempts remains a critical skill. Attackers increasingly target employee portals because they contain concentrated personal data.

Why This Matters

Employee data breaches often fly under the radar compared to customer-facing incidents. But for the 889 individuals affected, the exposure of SSN and bank details creates real, lasting harm.

Starbucks operates approximately 40,000 stores globally with over 400,000 employees. That 889 accounts were compromised from this scale suggests targeted attacks rather than mass phishing. Attackers may have focused on employees in specific roles or locations.

For the latest on data breach incidents and guidance on protecting personal information, we continue tracking disclosure patterns and defensive recommendations.

Related Articles