Coca-Cola Bottlers Face Data Breach Crisis: What You Need to Know

Published:

spot_img

gpt]
Rewrite the content fetched from

Multiple Coca-Cola bottlers compromised by data breaches

The Everest ransomware gang has claimed a Coca-Cola hack but the actual victim is the Middle East bottling partner, as a second hacker claims breach of the European bottling partner.

Hackers have claimed a pair of breaches of major Coca-Cola bottling partners that have compromised hundreds of employees and millions of internal records.

The Everest ransomware gang claimed to have hacked the Coca-Cola Company itself in a 22 May post to its darknet leak site, stating it had the records of 959 employees, including personal data and “internal and confidential information”.

You’re out of free articles for this month

Included in the post were details that suggested that Coca-Cola was not in fact the victim, but rather its Middle Eastern bottling partner, the Coca Cola Al Ahlia Beverages Company, headquartered in Dubai, and which trades publicly as Gulf Coca Cola Beverages. Multiple members of the Emirati royal family are major shareholders in the company’s parent organisation, the Al-Ahlia Group.

Included in the leaked post were employee details, passport scans that appear to belong to a pair of minors related to a senior executive in the company and other corporate data.

When contacted by Cyber Daily, the Coca-Cola Company did not provide a statement, but it is understood that the Everest attack has not compromised the company at all.

The Coca Cola Al Ahlia Beverages Company has not responded to Cyber Daily’s request for comment.

At the same time, a threat actor known as Gehenna has claimed a similar hack, this time to Coca-Cola Europacific Partners. Rather than a ransomware attack, this appears to be a straight-up data breach, with the hacker posting details of the breach to a hacking forum and selling the data to the highest bidder.

“Today, we are selling the Salesforce database of Coca-Cola Europacific Partners,” Gehenna said in their post.

“We are the same group responsible for the recent breaches of Samsung Germany and Royal Mail”.

According to the forum post, this breach compromised 23 million records from the company’s Salesforce database dating back to 2016, including 7.5 million Salesforce accounts, 9.5 million customer service cases, 6 million contact entries, and 400,000 product records. The total size of the data is just over 63 gigabytes.

Gehenna also claimed to “have more where that came from”.

Salesforce told Cyber Daily that its systems were secure despite the hacker’s claims.

“Salesforce has not been compromised, and this issue is not due to any known vulnerability in our platform,” a Salesforce spokesperson said.

“We continue to encourage all customers to follow security best practices to protect their data, including enabling MFA, following the principle of least privilege, and carefully managing connected applications. For more details, please visit https://www.salesforce.com/blog/protect-against-social-engineering/.”

David Hollingworth

David Hollingworth

David Hollingworth has been writing about technology for over 20 years, and has worked for a range of print and online titles in his career. He is enjoying getting to grips with cyber security, especially when it lets him talk about Lego.

into a completely fresh, human-written article that feels authentic and naturally written. The tone must reflect everyday human communication—professional, clear, and engaging without sounding like it’s generated by AI. Strictly avoid generic AI-style phrases, exaggerations, filler lines, or hallucinated content.

Structure the article with appropriate subheadings (H2, H3, etc.) and ensure it is *at least 500 words*. Each paragraph should be well-structured, focusing on a specific angle or detail from the source.

Incorporate *high-ranking SEO keywords* relevant to the topic where naturally appropriate—never forced. Prioritize keyword-rich phrases commonly searched online while maintaining readability and flow.

Use real-world phrasing, straight facts, and simple but intelligent language as used in human-authored blogs or news articles. Avoid summaries or conclusions; focus purely on rewriting the key points into a compelling narrative without inventing new ideas.

Do not add your own opinions or additional content—strictly rephrase and rewrite the original source material in a fresh, optimized, and human-sounding format.
[/gpt3]

spot_img

Related articles

Recent articles

Hospitality Sector Faces Rising Threats from Skilled Cybercriminals

gpt] Rewrite the content fetched from ...

Exploring Gen AI: Innovation or Overhyped Trend?

gpt] Rewrite the content fetched from 22 May Gen AI: Hype or help? Is GenAI the Breakthrough Endpoint Security Needed or Just Another Buzzword? asks Apu...

U.S. Takes Down DanaBot Malware Network: 16 Charged in $50 Million Global Cybercrime Scheme

gpt] Rewrite the content fetched from The U.S. Department of Justice (DoJ) on Thursday announced the disruption of the online infrastructure associated with DanaBot (aka...

Unveiling the Future of Data Management: Synology’s Comprehensive Solutions Shine at COMPUTEX 2025

Synology Unveils Cutting-Edge Data Management Solutions at COMPUTEX 2025 A New Era of Data Management At COMPUTEX 2025, Synology has captivated the tech community with an...