DoorDash has disclosed a data breach that hit the food delivery platform this October.
Beginning yesterday evening, DoorDash, which serves millions of customers across the U.S., Canada, Australia, and New Zealand, started emailing those impacted by the newly discovered security incident.
Your personal information affected
“On October 25, 2025, our team identified a cybersecurity incident that involved an unauthorized third party gaining access to and taking certain user contact information, which varied by individual,” states the email notification from DoorDash.
The information may have included:
- First and last name
- Physical address
- Phone number
- Email address
“Our investigation has since confirmed that your personal information was affected.”
(BleepingComputer)
The incident has been traced to a DoorDash employee falling victim to a social engineering scam. Upon becoming aware, the company’s incident response team shut down the unauthorized party’s access, started an investigation, and referred the matter to law enforcement.
The disclosure does not specify how many users were affected, though the company says the incident impacted a mix of consumers, Dashers, and merchants.
This marks the third notable security incident suffered by the delivery giant.
In 2019, a data breach at DoorDash had exposed the information of roughly 5 million customers, Dashers and merchants to an unauthorized party.
In August 2022, the company encountered another data breach from threat actors who had also attacked Twilio that year.
La traduction française suit
What’s interesting is that a French translation of the notice is appended to these emails:
At this time, it appears that the emails primarily went to DoorDash Canada users (including myself). However, an undated security advisory posted on DoorDash’s website suggests the incident may extend beyond Canada. It has references to U.S.-specific data types, like Social Security Numbers (SSNs), which DoorDash says were not accessed (Canadian counterpart would be Social Insurance Numbers (SINs)).
BleepingComputer has approached the DoorDash press team to clarify whether the breach also affects users in the U.S. or other regions where the company operates.
‘Took 19 whole days’
Some users on social media have rebuked DoorDash, questioning the company’s handling of the incident and the timing of the notifications.
“I’m sorry – if this isn’t sensitive information, what is? Don’t downplay this just because they didn’t get credit card or password information. It’s gone deaf,” posted Chris from Toronto.
Cybersecurity professional Kostas T. also reacted to the email’s phrasing, expressing that the statement “no sensitive information was accessed” conflicted with the personal information that the company acknowledged was accessed.
“DoorDash took 19 whole days to notify me of a data breach that has leaked my personal information. Thankfully I used a fake name and forwarded email address for my account, but my real phone number and physical address have been leaked,” wrote X user Ohqay.
“This is incredibly unprofessional, dangerous, and potentially illegal behaviour from DoorDash… This process violates Canadian data breach law. I’ll be filing a case against DoorDash in provincial small claims court and making a complaint to the Office of the Privacy Commissioner of Canada.”
Users should be wary of unsolicited communications or targeted phishing emails appearing to originate from DoorDash.
DoorDash warns that you should avoid clicking on links or attachments within suspicious emails, and to refrain from providing any personal information to unfamiliar websites.
“We have already taken steps to respond to the incident, including deploying enhancements to our security systems, implementing additional training for our employees, bringing in a leading cybersecurity forensic firm to assist in our investigation of this issue, and notifying law enforcement for ongoing investigation,” states the company.
DoorDash users with questions related to the incident can further call the toll-free number +1-833-918-8030 and cite reference code: B155060.
BleepingComputer awaits DoorDash’s response on the exact scope of the incident.
As MCP (Model Context Protocol) becomes the standard for connecting LLMs to tools and data, security teams are moving fast to keep these new services safe.
This free cheat sheet outlines 7 best practices you can start using today.




0 Comments