Cyber Crime

Ransomware attack on food giant Dole Food Company blocked North America production

The producers of fruit and vegetables Dole Food Company disclosed a ransomware attack that impacted its operations.

Dole Food Company is an Irish agricultural multinational corporation, it is one of the world’s largest producers of fruit and vegetables, operating with 38,500 full-time and seasonal employees who supply some 300 products in 75 countries. Dole reported 2021 revenues of $6.5 billion.

The company announced that it has suffered a ransomware attack that impacted its operations.

The company did not provide details about the attack, such as the ransomware family that infected its systems.

“Dole plc (DOLE:NYSE) announced today that the company recently experienced a cybersecurity incident that has been identified as ransomware.” reads a notice published by the company. “Upon learning of this incident, Dole moved quickly to contain the threat and engaged leading third-party cybersecurity experts, who have been working in partnership with Dole’s internal teams to remediate the issue and secure systems.”

The company immediately launched an investigation into the security breach with the help of leading third-party forensics experts, it also notified authorities about the incident.

After a few days, it became clear that the cyberattack seriously disrupted Dole’s operations, causing a temporary shutdown of production plants and affecting food supplies to U.S. grocery stores.

The security breach led to some Texas and New Mexico stores being unable to stock Dole salad kits for several days, reported the website Entrepreneur.com.

A Texan grocery store shared on Facebook a memo sent by Dole that was informing it that the company was forced to shut down its systems in North America to contain the attack.

“Good afternoon, Dole Food Company is in the midst of a Cyber Attack and have subsequently shut down our systems throughout North America. Our IT group is working hard on mitigating the issues in order to get our systems up and running ASAP. Our plants are shut down for the day and all shipments are on hold. All our businesses are implementing our Crisis Management Protocol to resume “business as usual” post haste, inclusive of our Manual Backup Program if needed.” reads the notice.

“Please bear with us as we navigate our way and hopefully we will minimize this event.
Thank you for your patience and your salesperson will keep you updated and informed of our progress.
Sincerely.”

At this time it is unclear if threat actors have stolen data from the system at the food company giant.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Dole Food Company)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Misconfigured email routing enables internal-spoofed phishing

Attackers exploit misconfigured email routing to spoof internal emails, using PhaaS platforms like Tycoon2FA to…

4 hours ago

Veeam resolves CVSS 9.0 RCE flaw and other security issues

Veeam patched a critical RCE flaw in Backup & Replication, CVE-2025-59470, rated CVSS 9.0, along…

7 hours ago

Hackers actively exploit critical RCE flaw in legacy D-Link DSL routers

Attackers are exploiting a critical flaw (CVE-2026-0625) in old D-Link DSL routers that allows remote…

9 hours ago

Fake Booking.com lures and BSoD scams spread DCRat in European hospitality sector

PHALT#BLYX targets European hotels with fake Booking emails and BSoD lures, tricking staff into installing…

11 hours ago

CERT/CC warns of critical, unfixed vulnerability in TOTOLINK EX200

CERT/CC disclosed an unpatched flaw in the TOTOLINK EX200 that allows a remote authenticated attacker…

22 hours ago

Google fixes critical Dolby Decoder bug in Android January update

Android’s January 2026 update fixes CVE-2025-54957, a critical Dolby audio decoder flaw discovered by Google…

24 hours ago

This website uses cookies.