Anheuser-Busch Distributor, Ben E. Keith, Network Breach Update

  • By Steven
  • Published: Dec 12, 2023
  • Last Updated: Dec 15, 2023
Ben E. Keith, Network Breach Update
"The Ben E. Keith East Texas Division in Commerce, Texas (United States)" by Michael Barera is licensed under CC BY-SA 4.0. Source: Wikimedia Commons

Ben E. Keith Company (BEK) is a food and drink distributor that serves over 62 Texas counties and 15 states. They are a service provider for Anheuser-Busch products, providing everything from craft and import drinks to steaks and sugar. In October, BEK announced a possible data breach of their network information, but further details required an investigation. Their investigations have presumably ended, as a notice for the event has recently appeared on the Texas Attorney General’s website. 

How Did the Attack Occur? 

When we first learned about the cyberattack, BEK had submitted a breach report to the Maine Attorney General. At that time, investigations were ongoing; however, BEK finally posted a data breach notice on their website earlier this week—including updated information. According to the notice, the cyber event involved an unauthorized actor accessing a portion of BEK’s network. The updated notice does not share information about how the attackers made the assault possible, leading to speculations concerning system access. There are no indications of human error or system vulnerabilities; even so, BEK has responded to the event with increased security protocols. 

What Information Was Viewed or Stolen? 

The Texas filing offers information about the stolen data in the event (elements not shared in the Maine report). According to Texas, the information loss is significant; it includes names, dates of birth, Social Security Numbers, addresses, driver’s license numbers, government ID numbers (passports and state ID numbers), health insurance information, medical information (diagnosis and treatment details), and financial information (account numbers, credit/debit card numbers, and payment details). The stolen details differ between individuals, but their exposure remains a critical event; the criminals can use any of the information to severely impact the lives of the data owners.

How Did Ben E. Keith Admit to the Breach? 

The notice on BEK’s website states the actor breached their system from March 3rd, 2023, to the 5th. Two weeks later, around March 14th, BEK officials became aware of suspicious activity within the network. The hallmarks of the activity are not public, leading experts to presume the attack did not involve malware or ransomware. BEK immediately isolated the accessed network gates and notified preliminary parties of the breach. The Maine filing further indicates that officials notified parties around October 26th. BEK’s website did not post their data notice until early December, while their Texas filing appeared on December 8th. 

What Will Become of the Stolen Information? 

The information stolen in this breach can be misused in various ways, most profitable. However, how the assailants can use it partially depends on how the owners of the information respond to the event. For example, if the bad actors were looking for a financial account to commit wire fraud, account holders can secure their information by obtaining new account details. If the assailants want to utilize Medicare/Medicaid services, alerting healthcare providers can limit their fraudulent options. Regardless of how the cybercriminals may use the information, data owners can still influence the consequences of BEK’s breach. 

What Should Affected Parties Do in the Aftermath of the Breach? 

Individuals must closely monitor their accounts, particularly if they are not changing or updating any information. Choosing not to update or change account data is simple in the short term, but it may put them at risk for future misuse. Cybercriminals can take years to utilize the data; subsequently, in that time, account holders may become lax in their caution. Those with information exposed in this breach must consider updating their accounts with strong passwords and security features.

About the Author
IDStrong Logo

Related Articles

Instagram Vulnerability Allowed Hackers Access to Control Your Phone

Security experts Check Point Research discovered a critical vulnerability while examining Instagra ... Read More

Alien Malware Infects More than 226 Mobile Apps and Steals Bank Data

As reported on September 24, 2020, by ZDNet and ThreatPost, a new strain of malware named “A ... Read More

Universal Health Systems Hit by Ransomware Attack

Universal Health Systems (UHS), a Fortune 500 company owning more than 400 hospitals across the co ... Read More

Exchange Server Bug Exposes a Big Risk to Hackers

Months after Microsoft released a patch to fix a serious flaw in MS Exchange Server, more than 61% ... Read More

Clients’ Bank Data Exposed in Blackbaud Ransomware Attack

Blackbaud software was victim to a ransomware attack last May, and new information suggests that c ... Read More

Latest Articles

What You Need to Know about the Panera Bread Data Breach

What You Need to Know about the Panera Bread Data Breach

Panera Bread is a leading American bakery-café fast casual restaurant chain with over 2,000 locations across the United States and Canada.

What You Need to Know about the Crunchbase Data Breach

What You Need to Know about the Crunchbase Data Breach

Crunchbase is a leading market intelligence platform that provides comprehensive data on private and public companies worldwide.

What You Need to Know about the Minnesota Department of Human Services Data Breach

What You Need to Know about the Minnesota Department of Human Services Data Breach

The Minnesota Department of Human Services (MN DHS) is a vital part of the state's health plan industry. It is responsible for managing public health, welfare programs, and social services within the state, ensuring support for vulnerable populations and that millions of residents have seamless access to healthcare. 

What You Need to Know about the Illinois Department of Human Services Data Breach

What You Need to Know about the Illinois Department of Human Services Data Breach

The Illinois Department of Human Services (IDHS) is one of the state's largest agencies, with over 15,000 employees. Created in 1997, it provides residents with streamlined access to integrated services, especially those who face multiple barriers to self-sufficiency and others who are striving for economic independence. 

What You Need to Know about the Central Maine Healthcare Data Breach

What You Need to Know about the Central Maine Healthcare Data Breach

Central Maine Healthcare was founded in 1891 as an integrated healthcare delivery system and is headquartered in Lewiston, Maine.

What You Need to Know about the Brightspeed Data Breach

What You Need to Know about the Brightspeed Data Breach

Brightspeed is a fiber broadband and telecommunications company that provides accessible, inclusive, high-quality internet. Launched in 2022 and headquartered in Charlotte, North Carolina, the company serves millions of homes and businesses across 20 states, predominantly in the Southeast and Midwest regions of the United States. 

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Notice

By proceeding with this scan, you agree to let IDStrong run a Free Scan of supplied parameters of your personal information and provide free preliminary findings in compliance with our Terms of Use and Privacy Notice. You consent to us using your provided information to complete the Free Scan and compare it against our records and breach databases or sources to provide your Free preliminary findings report.

Rest assured: IDStrong will not share your information with third parties or store your information beyond what is required to perform your scan and share your results.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close