The Latest / Data Security News
January 23, 2018
A chain of restaurants, primarily operating in Texas, Jason’s Deli, has been the latest victim of a data breach. The incident saw payment card details of approximately two million customers compromised.
Jason’s Deli was notified at the end of 2017 that a large quantity of payment card details had recently appeared for sale on the ‘dark web’, and analysis suggested it may have come from their store locations.
In co-operation with law enforcement and cyber forensic experts, Jason’s Deli has now confirmed that point-of-sale terminals in a number of its restaurants were targeted by a RAM-scraping malware. In Texas alone, 71 stores were hit by the attack.
The investigation revealed that such hacking started as early as June 8, 2017. In that time, some two million customers’ payment card details were stolen. That data could include name, card number, expiration date, cardholder verification value and service code. It does not include the CVC printed on the back of most credit or debit cards.
Jason’s Deli said it had closed the security vulnerability, and it has an extensive post on its website explaining all the details of the hack and how customers in each state affected should respond.
We’ve seen similar attacks to this in the past, Forever 21 most recently. A common thread in these kinds of attacks is how long data breaches can go undetected by organizations. Lots of organizations respond strongly to cyber incidents, just like Jason’s Deli has here, but of course, the organization would rather have caught it early in the first place.
We know how difficult a challenge that is here at Global Data Sentinel. That’s why we provide solutions to organizations that can thwart hacks before they turn into a seriously big problem. We help you quickly learn what is and isn’t usual behavior on your system, closing it down automatically when appropriate and prompting administrator investigation when needed.
Don’t wait for your lunch to get stolen before responding strongly to cyber-attacks. It’s better to get on the front foot and stop such incidents as soon as they strike.
Your key and files are encrypted on your device before they are ever sent to, or stored with us. We can’t even access your key or files.
May 20, 2015