Chili’s is the latest chain restaurant to suffer from a payment card breach, with limited information available as investigators work to determine the scope of the incident.
On May 11, Chili’s learned that some of its patrons’ payment card information was compromised at certain Chili’s restaurants; the restaurant chain operates 1,600 Chili’s restaurants total.
The chain believes malware was used to gather payment card information, including credit and debit card information and cardholder names from payments systems used for in-restaurant purchases. They believe the incident is limited to between March-April 2018, however, the incident is still being investigated.
It provided additional details in a press release:
We deeply value our relationships with our Guests and our priority remains doing what is right for them. We are committed to sharing additional information on this ongoing investigation. More details can be found at: http://brinker.mediaroom.com/ChilisDataIncident.
While third-party forensic experts review the incident, the organization is setting up identity theft and credit monitoring services for affected Chili’s customers. NNT suggests closely monitoring your payment card if used at Chili’s during that time and notifying your financial institutions of any suspicious transactions made.
Chili’s is one of many restaurants that have suffered payment card breaches this past year, including Applebee’s which experienced a PoS breach between December 6, 2017, and January 2, 2018. Point of Sale systems have always presented a lucrative opportunity for fraudsters, but these systems are too sensitive to let go unarmed without proper defense measures in place. Most importantly, organizations dealing with payment transactions must adhere to the PCI DSS compliance standard. NNT makes achieving, proving and remaining compliant simple. Interested in learning just how NNT can help you achieve PCI DSS DSS V3.2 compliance? See below for more details
Learn how NNT Addresses PCI V3.2 Compliance Requirements
Requirement 1 & 2: Build and Maintain a Secure Network & Systems
PCI DSS 3.2
Requirement
NNT Solution
Requirement 1: 1.1, 1.2, 1.3
Install and maintain a firewall configuration to protect cardholder data
Use NNT Change Tracker to apply a configuration baseline – NNT provide CIS Benchmark Checklists to ensure the most secure and effective configuration settings are used for firewalls.
Apply File Integrity Monitoring to firewall rules and other security configuration settings for tight change management, plus collect logs from firewalls to detect security incidents in advance of any breach
Requirement 2: 2.1, 2.2, 2.3
Do not use vendor-supplied defaults for system passwords and other security parameters
Prebuilt device hardening templates derived from CIS Benchmarks are used to audit for any vulnerabilities present: database systems, servers, and network devices are then continuously monitored for any drift from the desired, hardened state
Note: CIS Benchmarks are the primary recommended source of hardening checklists and NNT Change Tracker is one of only a select few CIS Certified Vendors see http://www.newnettechnologies.com/cis-benchmark.html
File Integrity Monitoring technology ensures access to Cryptographic Keys is restricted, and any attempted unauthorized access is logged and alerted, including changes of accounts, privileges, and permissions
Requirement 4: 4.1
Encrypt transmission of cardholder data across open, public networks
Use Device Vulnerability Reports to pre-audit for the use of non-encrypted console access methods being enabled, thereafter monitor for any configuration change affecting the devices' hardened state
Requirement 5 & 6: Maintain a Vulnerability Management Program
PCI DSS 3.2
Requirement
NNT Solution
Requirement 5: 5.2
Use and regularly update anti-virus software or programs
NNT Change Tracker will check that AV services are activated and running, Log Tracker will alert on all significant AV events
Requirement 6: 6.1, 6.4
Develop and maintain secure systems and applications
Change Tracker will maintain host and application security settings, even for bespoke applications, and record all software and patch updates. Log Tracker will provide a complete audit trail of application and host access attempts.
Track and monitor all access to network resources and cardholder data
Audit trails are constructed automatically using predefined Log Tracker templates for PCI DSS V3.1, including default alerts for security threats
Requirement 11: 11.1, 11.4, 11.5
Regularly test security systems and processes
File Integrity Monitoring across all platforms and devices is an essential defense against malware and any 'inside man' threat to card and customer data - built-in templates for PCI DSS V3.1 are provided and can be customised, leveraging CIS Benchmark checklists to highlight system vulnerabilities. NNT Change Tracker shows 'who made the change' with continuous and real-time detection of any changes
The Most Powerful & Reliable Cybersecurity Products
Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.
Fast Cloud: Leverage the world’s largest whitelist repository to automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology)
Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.
Log Tracker: Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds