PF Chang's says breach was 'highly sophisticated criminal operation'
But the restaurant chain still hasn't said how many cards were affected or how the data was stolen
IDG News Service - Restaurant chain P.F. Chang's China Bistro says the theft of credit and debit card information from some of its restaurants earlier this year was "part of a highly sophisticated criminal operation."
But the chain, which only discovered the breach after a large batch of card numbers were offered on an Internet forum, said it's still working with the U.S. Secret Service and forensic experts to determine exactly what happened.
"We continue to make progress in our investigation into the recent security compromise that affected P.F. Chang's," said Rick Federico, CEO of PF Chang's, in a statement posted Tuesday on the company's website. "We will continue sharing important details once they have been confirmed by a team of third-party forensic experts."
The statement was the first update issued by the company in three weeks and didn't add much additional information to what was already known: that an attack apparently hit the point-of-sale systems in the company's restaurants and sucked up card numbers used between March and May of this year.
After the breach was discovered June 10, the restaurant switched to manual card imprinters in its restaurants, which were later processed via an encryption-enabled terminal that works on a dial-up fax line. Additional terminals have recently been delivered to restaurants to decrease the reliance on the hand-operated imprinters, the company said.
The breach was the latest in a string of attacks against point-of-sale systems at major U.S. retailers. In late 2013 around 70 million customer records were compromised in an attack on Target stories and criminals also targeted Nieman Marcus.
In those attacks, payment card details were grabbed by malicious software after cards were swiped. P.F. Chang's has yet to disclose specific details about how attackers gained access to card information in its system.
A recent survey determined such breaches are speeding adoption of chip-based payment cards in the U.S.
Martyn Williams covers mobile telecoms, Silicon Valley and general technology breaking news for The IDG News Service. Follow Martyn on Twitter at @martyn_williams. Martyn's e-mail address is email@example.com
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to... All Cybercrime and Hacking White Papers | Webcasts