Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cloud
    • Cloud
    • Cybersecurity
    • Storage

    P.F. Chang’s Data Breach Underscores POS System Vulnerabilities

    Written by

    Sean Michael Kerner
    Published June 13, 2014
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Chinese restaurant chain P.F. Chang’s confirmed June 12 that it was the victim of a security compromise affecting its credit card payment terminals. The breach draws renewed attention to the vulnerability of point-of-sale systems and the impact of that on restaurateurs and other retailers as well as their customers.

      The compromise was first alleged in a post by blogger Brian Krebbs on June 10, which is the same date the restaurant said it learned of the security incident from the U.S. Secret Service.

      “We are coordinating with the United States Secret Service on an investigation to determine when the incident started and what information is involved,” P.F. Chang’s said in a statement.

      Full details on the security compromise have not yet been disclosed, but it is apparent that the payment-card terminals in the restaurant were likely the point of compromise. To help protect its customers while the investigation is ongoing, Chang’s noted that its restaurants in the United States will now be using manual credit card imprinting devices to handle credit and debit card transactions.

      “This allows you to use your credit and debit cards safely,” Chang’s stated.

      The breach at P.F. Chang’s is not surprising to security experts.

      More retail breaches will likely be discovered and reported in the next few months, Morey Haber, senior director of program management at BeyondTrust, told eWEEK. “Considering restaurants operate on very small margins, and security is not a primary concern, I am actually surprised more companies like this have not been compromised,” he said.

      Philip Casesa, director of IT/service operations for security education group (ISC)2, told eWEEK that P.F. Chang’s security compromise appears to follow the same approach that attackers leveraged in the big Target breach, in which point-of-sale (POS) machines with traditionally weak security were targeted.

      Target reported Dec. 13 that it was the victim of data breach that affected 70 million of its customers.

      “Large retailers maintain centralized connections to these machines for updating, and an attacker can exploit that to distribute malware efficiently and collect large swaths of magnetic stripe data from the cards,” Casesa said. “Without proper detection of this malware on the retailer’s part, these breaches can run almost unfettered until the attackers have enough or their exploit window is somehow closed.”

      Until security on retail point-of-sale systems becomes pervasive, attacks will continue, he added.

      The fact that retailers have now been proven to be a vulnerable target will further encourage more attacks, according to Dwayne Melancon, chief technology officer at Tripwire.

      “A lot of retailers don’t have information security as a core competency within their organizations, which means some of them are easier targets,” Melancon told eWEEK. “When one of those soft targets becomes a victim, criminals notice that the retail sector provides a lot of opportunity.”

      Is Paper Safer?

      P.F. Chang’s decision to forgo electronic payment terminals and revert to the manual imprint method isn’t necessarily a safer approach, security experts said.

      A stack of imprinted cards is just as valuable as having the electronic versions and can be copied (using a copier, smart phone camera, etc.) for malicious purposes, too, Haber said.

      “I can only assume P.F. Chang’s has chosen this method since the electronic system they have, has been compromised at the store level, versus a database breach on the back end,” Haber said. “This is the only method they have to still conduct business.”

      P.F. Chang’s Data Breach Underscores POS System Vulnerabilities

      However, Tripwire’s Melancon said going to manual imprint for credit card information is an entirely bad idea. “In terms of establishing trust after a breach, going to the use of carbon forms to gather payment information isn’t as crazy as it sounds,” he said. “After all, if you’re not sure which of your data systems you can trust, why would you put even more data into those systems?”

      That said, Melancon added that going to physical collection of the card information might reduce the number of people who interact with the data because that information is no longer accessible on an open network, but it isn’t practical in the long term.

      “The risk in paper-based collection is that many retailers no longer have effective processes or employee training designed to secure, monitor and control physical card slips,” Melancon said. “This means that, while a paper-based approach may reduce one specific type of risk, it doesn’t totally eliminate risk altogether; it changes the data protection problem to a different form.”

      What Customers Should Do

      As is the case with any retail data breach, customers should always be looking at their credit card and bank transaction statements for fraudulent charges.

      “As the investigation progresses, it’s likely that issuing banks will take proactive measures to cancel cards they suspect are compromised,” Casesa said. “Banks are monitoring stolen card data sites looking for their own cards, and it’s through this mechanism that the breaches are discovered.”

      P.F. Chang’s customers should request a new credit card from their credit card issuer, Haber said.

      For those choosing to visit a P.F. Chang’s restaurant, Haber advises: “If you can, pay cash until their electronic system is functioning again.”

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.