Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

Hack into Chili’s POS Leads to Theft of Client Payment Details

 

Brinker International Inc. the owner of a restaurant chain urged on May 12 that client data might've got seized from the Chili's cuisine chain of Tex-Mex under the company's umbrella within what appears to be one more instance of POS hacking of a retail firm.

 

One media release described the incident to be some unauthorized access. The firm stated that it came to know about certain guests' payment card details getting compromised when they visited a few of Chili's Grill & Bar eateries during one data breach spanning March-April. Siliconangle.com posted this, May 13, 2018.

 

Without telling the names of locations impacted alternatively to what extent the data hack spread, the company stated it believed a malware had been employed for hacking into the payment card data, notably debit/credit card numbers along with names of the card owners.

 

Brinker was able to know of the incident 11th May, it stated, adding that just a few restaurants had been impacted. In its disclosure, the company stated that card-owners needn't withdraw their bank A/Cs; however, require watching for possible suspicious operations.

 

In its apologies extended to people possibly impacted, Brinker stated it sincerely regretted the incident and was sorry for those impacted but it was assuring everyone that it was working diligently for a solution. The company's statement appeared on Brinker's website. More details of the hack were available on Brinker's global website.

 

Brinker additionally stated that based on current investigation, it believed the malware had helped filch debit/credit card owners' names and their card numbers from point of sale terminals. To infiltrate point-of-sale (POS) terminals there are usually two different methods. One is by infecting some corporate network so that the infection ultimately hits the said terminals. Another that's pretty frequent is infiltrating locally wherein the hacker attacks a particular store's retail network via plugging malware-carrying USB attachment. Because the hack in question impacted just a few locations, it indicates the second method was used.

 

According to Brinker, it had engaged an intermediate party for carrying out a wide investigation for confirming the hack's scope as well as nature, while it had also notified law enforcement.

» SPAMfighter News - 21-05-2018

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next