Grant West, 25, who lived in a caravan in Minster-on-Sea, Kent, used usernames and passwords stolen from third parties to access customer accounts.
The scam over a five-month period between July and December 2015 left Just Eat with a bill of around Ј210,000 in mitigation costs.
Similar attacks were launched against firms including Sainsbury's, Groupon, Uber, T-Mobile and Argos between August and September this year - after West was bailed.
West tried to get customers' 'Fullz' - typically made up of names, addresses, email addresses, passwords and credit card CVV numbers - which could then be sold.
He pleaded guilty at Southwark Crown Court to conspiracy to defraud Just Eat and its customers along with a string of other charges related to his dark web shop.
If you treasured this article and you would like to be given more info about Guide to Trusted Shop nicely visit our own web site. At no point were Just Eat systems compromised or breached. 'Protecting our brand and our customers from online fraud is of utmost importance to us. We have a dedicated information security team. 'We do not store customer card details on our website or app and all payments are managed securely by an independent, external payment service provider.'
Уважаемый посетитель, Вы зашли на сайт kopirki.net как незарегистрированный пользователь. Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.