The Missouri-based cinema chain, B&B Theaters, is under investigation for a possible two-year breach of credit card credentials following a tip-off from a banking partner.

Estimates from security experts like Brian Krebs find that customers may have been exposed from April 2015 till April 2017, leaving an unsettling window of opportunity for attackers.

The investigation is currently being conducted by security firm, Trustwave. The investigation by the firm “did not conclude that customer’s data was at risk on all B&B systems for the entirety of the breach.”

It’s highly likely the hackers infiltrated the organizations POS systems to scrape card magstripe data. This issue is alleviated with the implementation of the Chip & PIN credit cards and card readers, which has been mandated by the PCI-DSS Compliance Standard to help protect card data.

The theory is that, by encrypting card details as soon as they hit the card swipe or PED (Pin Entry Device), the POS is then only handling pre-encrypted card data and is therefore de-scoped. This doesn’t mean the POS is secure or immune to malware, just that card data no longer exists in a non-encrypted format.

Time and time again, POS terminals have been proven to be easy targets for criminals and simply too sensitive to leave them without defense measures implemented.

It’s important that organizations protect their POS terminals by implementing a hardened build standard with precision change detection (the PCI DSS recommends using the CIS Benchmarks as the best hardening standard to adopt). This combined with Breach Detection Technology (FIM-based Host Intrusion Detection Systems) will ensure that if a breach is successful, you will be alerted to the fact immediately, so that any card data loss can be stopped.


Read this article on Info Security Magazine




The Most Powerful & Reliable Cybersecurity Products

change tracker gen7r2 logo

Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.

FAST Cloud logo

Fast Cloud: Leverage the world’s largest whitelist repository to automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology)

vulnerability tracker logo

Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

log tracker logo

Log Tracker: Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds

Contact Us

Corporate Headquarters

6160 Warren Parkway, Suite 100
Frisco, Texas, 75034

Phone 1: 1-949-407-5125

Phone 2: 888-638-9749 (toll-free)

[email protected]

United Kingdom

5 New Street Square
London EC4A 3TW

Phone: +44 (0) 203 588 3023

 [email protected]
SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2024, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.