Huddle House, an Atlanta-based restaurant chain with over 300 locations across the United States, has become the latest restaurant chain to suffer a Point-of-Sale (POS) data breach.

The company informed customers on Friday last week that a malware intrusion had affected an unspecified number of its “corporate and franchised locations.” The company learned of the breach after being notified by law enforcement and its credit card processor that some of its restaurants may have been hit by a cyber-attack.

In a statement published last week, the company claims, “Criminals compromised a third-party POS vendor’s data system and utilized the vendor’s assistance tools to gain remote access — and the ability to deploy malware — to some Huddle House corporate and franchisee POS systems.”

The company took swift action to get the malware contained by opening and IT investigation and hiring a security firm to “deploy specialized software to prevent further attacks.” The investigation is ongoing and has yet to determine the list of affected location, but the company has issued a warning to anyone who used a payment card at one of its locations between August 1, 2017 and present to keep a close eye on their credit card transactions.

Huddle House claims it has implemented additional security measures to reduce the risk of further attacks while the company continues to investigate the incident.

The malware deployed in this attack is a classic POS-scraping code intended to collect magnetic stripe data such as names, card numbers, expiration date, and verification value, and service code.

These kinds of attacks have become less popular today thanks to the adoption of the EMV standard across the United States, but hackers still try their luck since EMV adoption is not effective if improperly implemented by stores and restaurants.

File Integrity Monitoring and Device Hardening for POS systems couple have helped mitigate this security incident. Implementing a hardened build standard with precision change detection (the PCI DSS recommends using the CIS Benchmarks as the best hardening standard to adopt) and this coupled with breach detection technology (FIM-based Host Intrusion Detection system or HIDS) would ensure that even if a breach was successful, they would have been alerted to it immediately so that action can be taken before card data is compromised.

The Most Powerful & Reliable Cybersecurity Products

change tracker gen7r2 logo

Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.

FAST Cloud logo

Fast Cloud: Leverage the world’s largest whitelist repository to automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology)

vulnerability tracker logo

Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

log tracker logo

Log Tracker: Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds

Contact Us

Corporate Headquarters

Netwrix
6160 Warren Parkway, Suite 100
Frisco, Texas, 75034

Phone 1: 1-949-407-5125

Phone 2: 888-638-9749 (toll-free)


[email protected]
 

United Kingdom

Netwrix
5 New Street Square
London EC4A 3TW

Phone: +44 (0) 203 588 3023


 [email protected]
SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2024, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.