30 Locations Affected Over 8 Months In The PF Chang Breach – Chuck Leaver

Written By Chuck Leaver Ziften CEO


The PF Chang dining establishment chain recently published brand-new information about the security breach of its charge card systems across the nation. The restaurant chain revealed that the breach impacted more than 30 locations in 17 states and went on for eight months before being found.

While the investigation is still continuing, in a statement PF Chang’s reported that the breach has been contained and client monetary data has been processed securely by the restaurant since June 11. The compromised systems utilized by the chain were decommissioned until it was clear that their security could be guaranteed, and in the meantime charge cards were processed by hand.

Rick Federico, CEO said in a declaration “The possibly stolen credit and debit card data includes the card number and sometimes also the cardholder’s name and/or the card’s date of expiry.” “However, we have not identified that any particular cardholder’s credit or debit card data was stolen by the attacker.”

PF Chang’s was notified of the breach, which they referred to as a “extremely advanced criminal operation,” in June when they were contacted by the Secret Service about cyber security concerns. Once notified, the restaurant employed third-party forensic investigators to discover how the breach was able to occur, at which time they found that malicious actors had the ability to exploit the chain’s charge card processing systems and potentially gain access to client credit card information.

Organizations worried about similar data breaches impacting point-of-sale terminals should execute endpoint threat detection to keep critical systems secured. Endpoint defense includes tracking delicate access points – like POS systems, bar code readers and worker mobile devices – and mitigating dangers that appear. Continuous endpoint visibility is necessary to recognize hazards before they compromise networks and make sure enterprise security.

Leave a Reply

Your email address will not be published. Required fields are marked *