With time, cyber attacks are increasing all over the world. Recently the data of about 300 restaurants has been leaked. It is being told that many big restaurants KFC Pizza Hut Taco Bell and The Habit Burger Grill are included in this list.

A major cyber attack incident has come to light in the UK, in which UK's KFC, Pizza Hut, Taco Bell, and The Habit Burger Grill restaurants were affected by the ransomware attack. Brand Yum, which owns and operates these global fast-food chains, has reported that around 300 restaurants across the country were affected. Not only this, but the attackers also stole data, although the company has assured its customers that there is no evidence that their personal information was exposed.

300 restaurants were closed for a day

Yum Brands said in its statements that the recent ransomware attack affected some information technology systems. Following the attack, the company closed around 300 affected restaurants in the United Kingdom for one day, which have since been reopened after a day of closure. The company is actively engaged in the complete restoration of the affected systems, which is expected to be substantially completed in the coming days.

Take steps for cyber security

In addition, the company has also deployed response protocols, which include shutting down certain systems and implementing advanced monitoring techniques. It has also taken the help of cyber security and forensic experts as well as notified federal law enforcement.

Service restarted

The affected restaurants have now resumed normal operations and the company said the attack did not have a significant financial impact. However, the data was taken from the company's network and an investigation is underway. At this stage, there is no evidence that customer databases were stolen. However, the incident caused a temporary disruption.

What is Ransomware Attack?

In ransomware, cyber attackers encrypt the victim's files and demand payment in exchange for the decryption key. To gain access to the files, these attackers gain access to the targeted system through phishing emails or software applications.