Anheuser-Busch Distributor, Ben E. Keith, Network Breach Update

  • By Steven
  • Published: Dec 12, 2023
  • Last Updated: Dec 15, 2023
Ben E. Keith, Network Breach Update
"The Ben E. Keith East Texas Division in Commerce, Texas (United States)" by Michael Barera is licensed under CC BY-SA 4.0. Source: Wikimedia Commons

Ben E. Keith Company (BEK) is a food and drink distributor that serves over 62 Texas counties and 15 states. They are a service provider for Anheuser-Busch products, providing everything from craft and import drinks to steaks and sugar. In October, BEK announced a possible data breach of their network information, but further details required an investigation. Their investigations have presumably ended, as a notice for the event has recently appeared on the Texas Attorney General’s website. 

How Did the Attack Occur? 

When we first learned about the cyberattack, BEK had submitted a breach report to the Maine Attorney General. At that time, investigations were ongoing; however, BEK finally posted a data breach notice on their website earlier this week—including updated information. According to the notice, the cyber event involved an unauthorized actor accessing a portion of BEK’s network. The updated notice does not share information about how the attackers made the assault possible, leading to speculations concerning system access. There are no indications of human error or system vulnerabilities; even so, BEK has responded to the event with increased security protocols. 

What Information Was Viewed or Stolen? 

The Texas filing offers information about the stolen data in the event (elements not shared in the Maine report). According to Texas, the information loss is significant; it includes names, dates of birth, Social Security Numbers, addresses, driver’s license numbers, government ID numbers (passports and state ID numbers), health insurance information, medical information (diagnosis and treatment details), and financial information (account numbers, credit/debit card numbers, and payment details). The stolen details differ between individuals, but their exposure remains a critical event; the criminals can use any of the information to severely impact the lives of the data owners.

How Did Ben E. Keith Admit to the Breach? 

The notice on BEK’s website states the actor breached their system from March 3rd, 2023, to the 5th. Two weeks later, around March 14th, BEK officials became aware of suspicious activity within the network. The hallmarks of the activity are not public, leading experts to presume the attack did not involve malware or ransomware. BEK immediately isolated the accessed network gates and notified preliminary parties of the breach. The Maine filing further indicates that officials notified parties around October 26th. BEK’s website did not post their data notice until early December, while their Texas filing appeared on December 8th. 

What Will Become of the Stolen Information? 

The information stolen in this breach can be misused in various ways, most profitable. However, how the assailants can use it partially depends on how the owners of the information respond to the event. For example, if the bad actors were looking for a financial account to commit wire fraud, account holders can secure their information by obtaining new account details. If the assailants want to utilize Medicare/Medicaid services, alerting healthcare providers can limit their fraudulent options. Regardless of how the cybercriminals may use the information, data owners can still influence the consequences of BEK’s breach. 

What Should Affected Parties Do in the Aftermath of the Breach? 

Individuals must closely monitor their accounts, particularly if they are not changing or updating any information. Choosing not to update or change account data is simple in the short term, but it may put them at risk for future misuse. Cybercriminals can take years to utilize the data; subsequently, in that time, account holders may become lax in their caution. Those with information exposed in this breach must consider updating their accounts with strong passwords and security features.

About the Author
IDStrong Logo

Related Articles

Instagram Vulnerability Allowed Hackers Access to Control Your Phone

Security experts Check Point Research discovered a critical vulnerability while examining Instagra ... Read More

Alien Malware Infects More than 226 Mobile Apps and Steals Bank Data

As reported on September 24, 2020, by ZDNet and ThreatPost, a new strain of malware named “A ... Read More

Universal Health Systems Hit by Ransomware Attack

Universal Health Systems (UHS), a Fortune 500 company owning more than 400 hospitals across the co ... Read More

Exchange Server Bug Exposes a Big Risk to Hackers

Months after Microsoft released a patch to fix a serious flaw in MS Exchange Server, more than 61% ... Read More

Clients’ Bank Data Exposed in Blackbaud Ransomware Attack

Blackbaud software was victim to a ransomware attack last May, and new information suggests that c ... Read More

Latest Articles

What You Need to Know about the Delta Dental Data Breach

What You Need to Know about the Delta Dental Data Breach

Delta Dental is a dental insurance provider serving over 90 million Americans. It offers coverage in all 50 states, Puerto Rico, and Washington, D.C. The company was established in 1966 in California as part of the Delta Dental Plans Association.

What You Need to Know about the Hot Topic Data Breach

What You Need to Know about the Hot Topic Data Breach

Hot Topic plays in the fashion, apparel, and shoe industry as a retailer of music-influenced apparel and accessories, such as jeans, tops, belts, dresses, pajamas, sunglasses, jewelry, and tees.

Google Voice Scams: What They Are and How to Stay Safe

Google Voice Scams: What They Are and How to Stay Safe

Google Voice scams continue to pose a risk for users of this service. Scammers continuously attempt to lure users into divulging their verification PIN code.

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Notice

By proceeding with this scan, you agree to let IDStrong run a Free Scan of supplied parameters of your personal information and provide free preliminary findings in compliance with our Terms of Use and Privacy Notice. You consent to us using your provided information to complete the Free Scan and compare it against our records and breach databases or sources to provide your Free preliminary findings report.

Rest assured: IDStrong will not share your information with third parties or store your information beyond what is required to perform your scan and share your results.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close