Company Details
arby's
27,492
64,726
7225
arbys.com
0
ARB_7732512
In-progress

Arby's Company CyberSecurity Posture
arbys.comArby’s, founded in 1964, is the second-largest sandwich restaurant brand in the world with more than 3,400 restaurants in seven countries. Arby’s is part of the Inspire Brands family of restaurants. For more information, visit Arbys.com and InspireBrands.com With the current growth and momentum of the brand, Arby’s is actively seeking new franchisees. To learn more about available markets and requirements, visit ArbysFranchising.com
Company Details
arby's
27,492
64,726
7225
arbys.com
0
ARB_7732512
In-progress
Between 750 and 799

Arby's Global Score (TPRM)XXXX

Description: As one of the biggest fast-food sandwich companies in the US, Arby's Restaurant Group acknowledged that thieves had compromised its point-of-sale systems. When industry partners notified Arby's Restaurants of the security vulnerability, the company found out in mid-January. The corporation claims that only now, in response to a specific request from the FBI, has the card hack been made public. In order to eliminate malware, clean up its systems, and look into the credit card hack, the corporation engaged Mandiant and other security specialists.
Description: The California Office of the Attorney General reported that Jimmy John’s experienced a payment card security incident affecting approximately 216 stores. Unauthorized access occurred from June 16, 2014 to September 5, 2014, compromising credit and debit card data, including card numbers and potentially cardholder names, verification codes, and expiration dates. The report was made on September 24, 2014.
Description: On October 5, 2017, the California Office of the Attorney General reported that Sonic Drive-In experienced a malware attack that compromised credit and debit card numbers at certain locations. No specific number of individuals affected or breach date was provided, and the types of information impacted are limited to card numbers.


No incidents recorded for Arby's in 2025.
No incidents recorded for Arby's in 2025.
No incidents recorded for Arby's in 2025.
Arby's cyber incidents detection timeline including parent company and subsidiaries

Arby’s, founded in 1964, is the second-largest sandwich restaurant brand in the world with more than 3,400 restaurants in seven countries. Arby’s is part of the Inspire Brands family of restaurants. For more information, visit Arbys.com and InspireBrands.com With the current growth and momentum of the brand, Arby’s is actively seeking new franchisees. To learn more about available markets and requirements, visit ArbysFranchising.com


Subway is one of the world's largest quick service restaurant brands, serving freshly made-to-order sandwiches, wraps, salads and bowls to millions of guests, across over 100 countries in more than 37,000 restaurants every day. Subway restaurants are owned and operated by Subway franchisees – a ne

Somos um grande ecossistema de restaurantes que reúne marcas internacionais como Burger King®, Popeyes®, Starbucks® e Subway®. E, por trás de cada receita de sucesso, estão os Zampers: gente que faz acontecer, que joga junto e que deixa sua marca todos os dias. Aqui, a gente acredita que o verdad

Since opening in 1969 in Seattle, Washington, Red Robin has welcomed Guests to our casual dining restaurants in the U.S. and Canada, connecting people around craveable food and fun in a relaxed, playful atmosphere. Our people are the foundation of our success. We aim to be an inclusive employer of

Founded by Todd Graves in 1996 in Baton Rouge, La., RAISING CANE'S CHICKEN FINGERS has over 800 restaurants in 41 states, with many new restaurants under construction. The company has ONE LOVE®—craveable chicken finger meals—and is continually recognized for its unique business model and customer sa
With 58,000 employees and more than 700 restaurants in the United States and Canada, and a growing international presence, Red Lobster is the world’s largest seafood restaurant company. Our vision is to be where the world goes for seafood now and for generations. Red Lobster is an innovative, v

Papa Johns seeks people who have an entrepreneurial spirit and share our philosophy for success. Hands-on training, a clean and safe work environment, quality business practices, advancement opportunities and meaningful work combine to produce not only the best pizza, but also the best team members!
Pizza Hut, a subsidiary of Yum! Brands, Inc. (NYSE: YUM), was founded in 1958 in Wichita, Kansas, and since then has earned a reputation as a trailblazer in innovation with the creation of icons like Original® Pan and Original® Stuffed Crust pizzas. In 1994, Pizza Hut pizza was the very first online

In-N-Out Burger was founded in 1948 by Harry and Esther Snyder in Baldwin Park, California, and remains privately owned and operated. Under the direction of the Snyder family, the company has opened restaurants throughout California, Nevada, Arizona, Utah, Texas, Oregon, Colorado, and Idaho. In-N-
Wendy's was founded in 1969 by Dave Thomas in Columbus, Ohio. Dave built his business on the premise, “Quality Is Our Recipe®”, which remains the guidepost of the Wendy's system. Wendy's is best known for its made-to-order square hamburgers, using fresh, never frozen beef*, freshly-prepared salads,
.png)
DRM, a family owned and operated company has recently been under attack from a ransomware group. With 73 restaurants potentially compromised...
UPDATE (Oct. 3, 5:27 p.m. PT) — Burgerville says it has discovered a "sophisticated" cybersecurity breach that may have affected customers...
Data breaches continue to be a threat to consumers. Many companies were hacked and likely had information stolen from them since January...
FIN7 members engaged in a highly sophisticated malware campaign targeting more than 100 US companies, predominantly in the restaurant, gaming, and hospitality...
Restaurants are as vulnerable as any business when it comes to cybersecurity and data breaches. We saw that last month, when at least 5...
Hackers stole emails and documents from the Doyen Global publicity agency, which represents the former Manchester United/Real Madrid/LA Galaxy star.
The fast-food chain had fallen victim to a massive credit card data breach, and now it's been hit with eight different lawsuits from banks, credit unions, and...
Fast food chain Arby's confirmed that credit card data was stolen from thousands of its customers due to a data breach that took place last...
Arby's told KrebsOnSecurity that it recently remediated a breach involving malicious software installed on payment card systems at hundreds of its restaurant...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Arby's is http://www.arbys.com.
According to Rankiteo, Arby's’s AI-generated cybersecurity score is 779, reflecting their Fair security posture.
According to Rankiteo, Arby's currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Arby's is not certified under SOC 2 Type 1.
According to Rankiteo, Arby's does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Arby's is not listed as GDPR compliant.
According to Rankiteo, Arby's does not currently maintain PCI DSS compliance.
According to Rankiteo, Arby's is not compliant with HIPAA regulations.
According to Rankiteo,Arby's is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Arby's operates primarily in the Restaurants industry.
Arby's employs approximately 27,492 people worldwide.
Arby's presently has no subsidiaries across any sectors.
Arby's’s official LinkedIn profile has approximately 64,726 followers.
Arby's is classified under the NAICS code 7225, which corresponds to Restaurants and Other Eating Places.
No, Arby's does not have a profile on Crunchbase.
Yes, Arby's maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/arby's.
As of November 27, 2025, Rankiteo reports that Arby's has experienced 3 cybersecurity incidents.
Arby's has an estimated 4,808 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach and Cyber Attack.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with mandiant, third party assistance with other security specialists, and law enforcement notified with fbi, and containment measures with eliminate malware, containment measures with clean up systems..
Title: Arby's Point-of-Sale Systems Compromised
Description: Thieves compromised the point-of-sale systems of Arby's Restaurant Group, one of the biggest fast-food sandwich companies in the US.
Date Detected: mid-January
Type: Data Breach
Attack Vector: Point-of-Sale Systems
Threat Actor: Thieves
Motivation: Financial Gain
Title: Jimmy John's Payment Card Security Incident
Description: Unauthorized access to payment card data affecting approximately 216 stores.
Date Detected: 2014-09-24
Date Publicly Disclosed: 2014-09-24
Type: Data Breach
Attack Vector: Unauthorized Access
Title: Sonic Drive-In Malware Attack
Description: On October 5, 2017, the California Office of the Attorney General reported that Sonic Drive-In experienced a malware attack that compromised credit and debit card numbers at certain locations.
Date Detected: 2017-10-05
Date Publicly Disclosed: 2017-10-05
Type: Malware Attack
Attack Vector: Malware
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Point-of-Sale Systems.

Data Compromised: Credit card information
Systems Affected: Point-of-Sale Systems
Payment Information Risk: High

Data Compromised: Credit and debit card data, Card numbers, Cardholder names, Verification codes, Expiration dates
Payment Information Risk: High

Data Compromised: Credit and debit card numbers
Payment Information Risk: True
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Credit Card Information, , Credit And Debit Card Data, Card Numbers, Cardholder Names, Verification Codes, Expiration Dates, , Credit And Debit Card Numbers and .

Entity Name: Arby's Restaurant Group
Entity Type: Fast-Food Sandwich Company
Industry: Food and Beverage
Location: US
Size: Large

Entity Name: Jimmy John's
Entity Type: Restaurant Chain
Industry: Food and Beverage
Location: Multiple
Size: Approximately 216 stores

Entity Name: Sonic Drive-In
Entity Type: Restaurant Chain
Industry: Food and Beverage
Location: Certain locations

Third Party Assistance: Mandiant, Other Security Specialists.
Law Enforcement Notified: FBI,
Containment Measures: Eliminate MalwareClean Up Systems
Third-Party Assistance: The company involves third-party assistance in incident response through Mandiant, Other Security Specialists, .

Type of Data Compromised: Credit card information
Sensitivity of Data: High

Type of Data Compromised: Credit and debit card data, Card numbers, Cardholder names, Verification codes, Expiration dates
Sensitivity of Data: High
Personally Identifiable Information: Cardholder names

Type of Data Compromised: Credit and debit card numbers
Sensitivity of Data: High
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by eliminate malware, clean up systems and .

Source: Cyber Incident Description

Source: California Office of the Attorney General
Date Accessed: 2014-09-24

Source: California Office of the Attorney General
Date Accessed: 2017-10-05
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Cyber Incident Description, and Source: California Office of the Attorney GeneralDate Accessed: 2014-09-24, and Source: California Office of the Attorney GeneralDate Accessed: 2017-10-05.

Investigation Status: Ongoing

Entry Point: Point-of-Sale Systems
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Mandiant, Other Security Specialists, .
Last Attacking Group: The attacking group in the last incident was an Thieves.
Most Recent Incident Detected: The most recent incident detected was on mid-January.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2017-10-05.
Most Significant Data Compromised: The most significant data compromised in an incident were Credit Card Information, , Credit and debit card data, Card numbers, Cardholder names, Verification codes, Expiration dates, , Credit and debit card numbers and .
Most Significant System Affected: The most significant system affected in an incident was Point-of-Sale Systems.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was mandiant, other security specialists, .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Eliminate MalwareClean Up Systems.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Card numbers, Credit and debit card data, Credit and debit card numbers, Verification codes, Cardholder names, Credit Card Information and Expiration dates.
Most Recent Source: The most recent source of information about an incident are Cyber Incident Description and California Office of the Attorney General.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Point-of-Sale Systems.
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.