Data Breach

PoS systems infected in 1 in 20 Wendy’s stores, credit card exposed

The hack suffered by Wendy’s fast-food chain was bigger than thought, payment card data exposed in more than 1000 stores.

The hack suffered by Wendy’s fast-food chain was bigger than thought and exposed sensitive information, including credit card data.

Roughly one on three Wendy’s burger was hacked, a malware has infected PoS systems. Just after the hack, the experts speculated that 300 restaurants were impacted, unfortunately, it seems that roughly 2,025 outlets were compromised.

“As we have reported over the past several months, unfortunately, some Wendy’s restaurants have been the victim of malicious cyber activity targeting customers’ payment card information. ” said Todd Penegor President and CEO, The Wendy’s Company

The data breach was first spotted in January when suspicious transactions were detected by financial institutions, it is likely that the original compromise occurred in 2015.

Fraudsters operated until May when Wendy’s company confirmed that PoS systems at 300 restaurants were infected with a PoS malware.

Attackers used a malicious code that was able to steal payment card data from PoS systems.

“Wendy’s first reported unusual payment card activity affecting some restaurants in February 2016. In May, we confirmed that we had found evidence of malware being installed on some restaurants’ point-of-sale systems, and had worked with our investigator to disable it.  On June 9th, we reported that we had discovered additional malicious cyber activity involving other restaurants.  That malware has also been disabled in all franchisee restaurants where it has been discovered.” added Penegor.

A particular caught my attention, since Wendy’s has started the investigation the malware used to compromise the PoS systems in the stores evolved, and a new variant was detected by the experts while infecting restaurants of the chain.

“As part of the ongoing investigation that has been underway, Wendy’s discovered a variant of the malware – similar in nature to the original but different in its execution – affecting additional franchise locations.” reads the statement issued by Wendy. “We believe this series of cybersecurity attacks resulted from certain service providers’ remote access credentials being compromised, allowing access to the POS system.”

The company is still investigating with law enforcement and actors in the payment industry contacts. It seems that Wendy’s firm has successfully removed the malware from its systems.

To discover which stores have been hacked, use the service deployed by Wendy’s company.

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(Security Affairs – Wendy’s, data breach)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Qilin Ransomware gang claims the hack of the Ministry of Foreign Affairs of Ukraine

Qilin Ransomware group claims to have breached the Ministry of Foreign Affairs of Ukraine, marking…

3 hours ago

Elastic patches critical Kibana flaw allowing code execution

Elastic fixed a critical flaw in the Kibana data visualization dashboard software for Elasticsearch that could lead to arbitrary code…

5 hours ago

The U.S. DoJ charges 12 Chinese nationals for state-linked cyber operations

The U.S. Department of Justice (DoJ) charges 12 Chinese nationals for their alleged involvement in…

16 hours ago

Chinese Lotus Blossom APT targets multiple sectors with Sagerunex backdoor

China-linked Lotus Blossom APT targets governments and industries in Asian countries with new Sagerunex backdoor…

19 hours ago

China-linked APT Silk Typhoon targets IT Supply Chain

Microsoft warns that China-backed APT Silk Typhoon linked to US Treasury hack, is now targeting…

1 day ago

Hunters International gang claims the theft of 1.4 TB of data allegedly stolen from Tata Technologies

Ransomware group Hunters International claims to have hacked Tata Technologies, threatening to leak 1.4 TB…

1 day ago

This website uses cookies.