British pub chain JD Wetherspoon has become the most recent British company to suffer from a data breach.

The company informed customers last week that their personal credentials may have been compromised during the attack made on their website in mid-June 2015.

According to the email sent out to customers, the company learned of the attack on Tuesday, December 1 and since then have been working tirelessly to find those responsible while taking the appropriate measures necessary to protect customer data.

An investigation into the attack revealed hackers gained access to a customer database connected to the firm’s old website, hosted by a third party vendor. Sometime after the breach, the website was replaced and taken over by a new service provider who is not affiliated with the breach.

The company has claimed that customers’ names, dates of birth, email addresses and phone numbers of 656,723 people have been compromised. In addition, 100 customers had the last four digits of their payment card numbers compromised.

Customers who signed up for the JD Wetherspoon newsletters, registered to use the pubs’ WiFi, chose to receive company information, used the company contact form on their website, and purchased vouchers online between January 2009 and August 2014 are among the information stored in the company’s database.

JD Wetherspoon claims that there’s no evidence of fraudulent activity involving the compromised data, however, customers are being advised to steer clear of any emails asking for personal or financial information as well as any emails asking recipients to click on links or install software.


Learn about NNT's  Host Intrusion Detection Solutions

Read the article on Security Week







The Most Powerful & Reliable Cybersecurity Products

change tracker gen7r2 logo

Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.

FAST Cloud logo

Fast Cloud: Leverage the world’s largest whitelist repository to automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology)

vulnerability tracker logo

Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

log tracker logo

Log Tracker: Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds

Contact Us

Corporate Headquarters

6160 Warren Parkway, Suite 100
Frisco, Texas, 75034

Phone 1: 1-949-407-5125

Phone 2: 888-638-9749 (toll-free)

[email protected]

United Kingdom

5 New Street Square
London EC4A 3TW

Phone: +44 (0) 203 588 3023

 [email protected]
SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2024, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.