Skip to main content
New AI-powered DMARC analysis + open REST API See how → →
Foundational 4 min read

Kratos Targets Outpost24, Intuitive Data Breached, Starbucks Staff Exposed

Brad Slavin
Brad Slavin General Manager
Updated April 16, 2026 | Updated for 2026

Quick Answer

Kratos Targets Outpost24, Intuitive Data Breached, Starbucks Staff Exposed Kratos Targets Outpost24, Intuitive Data Breached, Starbucks Staff Exposed /! This file is auto-generated / !function(d,l){"use strict";l.querySelector&&d.addEventListener&&"undefined"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i ' title="Embed Code" class="input-embed input-embed-40486" readonly/> Phishing attacks dominated last week’s cyberincidents. Outpost24, a security firm, fell prey to a phishing attack.

Related: Free DMARC Checker

Kratos Targets Outpost24, Intuitive Data Breached, Starbucks Staff Exposed
What is dmarc 3297 150x150

DMARC monitoring should be as routine as checking your inbox, says Adam Lundrigan, CTO of DuoCircle. The aggregate reports tell you exactly who sends email from your domain. If you’re not reading them, you’re flying blind on your own email security posture.

					DMARC Report					

				

Kratos Targets Outpost24, Intuitive Data Breached, Starbucks Staff Exposed

					<button title="Play" aria-label="Play Episode" aria-pressed="false" class="play-btn">
						

Play Episode

					</button>
					<button title="Pause" aria-label="Pause Episode" aria-pressed="false" class="pause-btn hide">
						

Pause Episode

					</button>
					


				

				

					<audio preload="none" class="clip clip-40486">
						<source src="https://media.mailhop.org/dmarcreport/images/2026/03/Kratos-Targets-Outpost24-Intuitive-Data-Breached-Starbucks-Staff-Exposed.mp3">
					</audio>
					

						

					

					

						

							<button class="player-btn player-btn__volume" title="Mute/Unmute">
								

Mute/Unmute Episode

							</button>
							<button data-skip="-10" class="player-btn player-btn__rwd" title="Rewind 10 seconds">
								

Rewind 10 Seconds

							</button>
							<button data-speed="1" class="player-btn player-btn__speed" title="Playback Speed" aria-label="Playback Speed">1x</button>
							<button data-skip="30" class="player-btn player-btn__fwd" title="Fast Forward 30 seconds">
								

Fast Forward 30 seconds

							</button>
						

						

							<time class="ssp-timer">00:00</time>
							

/

							<!-- We need actual duration here from the server -->
							<time class="ssp-duration" datetime="PT0H2M21S">2:21</time>
						

					

				

			

								<nav class="player-panels-nav">
												<button class="subscribe-btn" id="subscribe-btn-40486" title="Subscribe">Subscribe</button>
																		<button class="share-btn" id="share-btn-40486" title="Share">Share</button>
										</nav>
						

	



		

						

				

					

					

				

				

					

																																																																								

					

						

RSS Feed

							<input value="https://dmarcreport.com/feed/podcast/dmarc-report" class="input-rss input-rss-40486" title="RSS Feed URL" readonly />
						

						<button class="copy-rss copy-rss-40486" title="Copy RSS Feed URL" aria-label="Copy RSS Feed URL"></button>
					

				

			

									

				

					

					

				

				

					

						Share						

					

						<a href="https://www.facebook.com/sharer/sharer.php?u=https://dmarcreport.com/blog/podcast/kratos-targets-outpost24-intuitive-data-breached-starbucks-staff-exposed/&t=Kratos Targets Outpost24, Intuitive Data Breached, Starbucks Staff Exposed" target="blank" rel="noopener noreferrer" class="share-icon facebook" title="Share on Facebook">
							

						</a>
						<a href="https://twitter.com/intent/tweet?text=https://dmarcreport.com/blog/podcast/kratos-targets-outpost24-intuitive-data-breached-starbucks-staff-exposed/&url=Kratos Targets Outpost24, Intuitive Data Breached, Starbucks Staff Exposed" target="blank" rel="noopener noreferrer" class="share-icon twitter" title="Share on Twitter">
							

						</a>
						<a href="https://media.mailhop.org/dmarcreport/images/2026/03/Kratos-Targets-Outpost24-Intuitive-Data-Breached-Starbucks-Staff-Exposed.mp3" target="blank" rel="noopener noreferrer" class="share-icon download" title="Download" download>
							

						</a>
					

				

				

					

						Link						

					

						<input value="https://dmarcreport.com/blog/podcast/kratos-targets-outpost24-intuitive-data-breached-starbucks-staff-exposed/" class="input-link input-link-40486" title="Episode URL" readonly />
					

					<button class="copy-link copy-link-40486" title="Copy Episode URL" aria-label="Copy Episode URL" readonly=""></button>
				

				

					

						Embed						

					

/*! This file is auto-generated */ ’ title=“Embed Code” class=“input-embed input-embed-40486” readonly/>

					<button class="copy-embed copy-embed-40486" title="Copy Embed Code" aria-label="Copy Embed Code"></button>
				

			

				



Phishing attacks dominated last week’s cyberincidents. Outpost24, a security firm, fell prey to a phishing attack. Intuitive’s company data was breached because of a sophisticated phishing attack. A whopping 900 Starbucks employees are now prone to threat attacks after phishing actors breached the internal employee portal.

Meanwhile, a new phishing campaign has been hijacking legitimate websites to target **Microsoft Teams users by evading detection systems.

Outpost24 executive targeted with the help of Kratos!

Dmarc check

Outpost24 is a Swedish exposure management and identity security firm. Threat actors used Kratos, a popular Phishing-as-a-Service kit, to target Outpost24. The attack was designed in a seven-step chain and comprised a highly intricate, layered infrastructure. Plus, they had genuine services that helped in evading detection and fooling the recipients.

_Outpost24 received the phishing message that successfully impersonated the renowned brand JP Morgan. _The malicious message looked like a part of an already existing email thread. The message asked the recipient to go through a specific document and then sign it. All the steps were taken carefully to earn the trust of the victim.

The threat actors managed to pass DMARC **authentication by using two DomainKeys Identified Mail signatures.

The malicious message consisted of a “review document” link. The same link conveniently passed Cisco’s Secure Email Gateway validation. All these further added to the credibility of the message .

On clicking the link, the victim would be redirected to Nylas, the genuine email API platform. Furthermore, the victim was redirected to a legitimate, India-based development company domain, and then to a 2017-registered domain owned by a Chinese entity. Dmarc analyzer

After multiple redirects, the victim landed on a **credible-looking **phishing page designed for extracting Microsoft 365 credentials.

An Outpost24 spokesperson has confirmed that a C-level executive fell for this sophisticated phishing attack.

Biotech brand, Intuitive’s customer and employee data compromised!

Intuitive, the surgical robotics firm, got targeted by a group of phishing actors. As a result of the cyberattack, the firm’s **employee and customer data **were compromised.

The cybercrooks managed to gain access to the login credentials of Intuitive’s employees. That’s how they broke into the internal administrative network and finally accessed the data. Intuitive has issued an online statement, shedding light on the data compromised. It includes corporate records, employee records, as well as customer contact and business details. As soon as the incident came to light, Intuitive deployed its incident response protocols and managed to secure all the applications affected in the phishing attack. An investigation is underway, and experts are also reviewing security protocols. Employees are being trained in online security and risk management.

Gmail dmarc

Intuitive believes that the cyberattack could not affect its customer-centric operations.

Since all their robotic systems are equipped with their own security protocols, they can operate separately and independently. That’s why the attack on the internal business network could not disrupt the operations of the robotic system platforms.

Starbucks employee portal targeted, 900 employees stand exposed!

What is dmarc

Threat actors managed to break into the Starbucks Partner Central accounts system. This is a SaaS platform used by Starbucks employees to manage all the employment details, such as payroll, leaves, benefits, and so on. Starbucks became aware of suspicious activities back on February 6, 2026. However, after a detailed investigation, Starbucks realized that the breach had happened somewhere between January 19 and February 11.

The phishing actors managed to access employee login credentials by directing the Starbucks employees to malicious websites. These websites are carefully structured to mimic the genuine Partner Central login page. By using this phishing strategy, threat actors were able to authenticate into real accounts without having to directly penetrate the core infrastructure of Starbucks .

The coffee giant has already notified law enforcement agencies. They have also bolstered the security controls on Partner Central. Starbucks has stated that this data breach won’t affect customers in any way.

Legitimate domains misused to target Microsoft Teams users

Dmarc analyzer

A new phishing campaign is doing the rounds that abuses **legitimate domains to harvest the credentials of Microsoft Teams users.

A group of security researchers from a reputed security firm has discovered a massive phishing operation that has been misusing WordPress websites to create credential-harvesting pages.

They embed malicious content within the content of these credible and reputable domains. This significantly minimizes the risk of being detected by any cybersecurity tools and spam filters.

Dmarc record

Primarily, the cybercrooks target Microsoft Teams users. But lately, they have also started targeting UAE Pass and Xfinity accounts. The reason behind hijacking already existing, **trustworthy domains is to boost the success rate of the phishing campaign. The malicious URLs look genuine to the victims and increase the likelihood of the target falling for the cyberattack.

Brad Slavin
Brad Slavin

General Manager

Founder and General Manager of DuoCircle. Product strategy and commercial lead for DMARC Report's 2,000+ customer base.

LinkedIn Profile →

Take control of your DMARC reports

Turn raw XML into actionable dashboards. Start free - no credit card required.