Published on January 7th, 2020 📆 | 3010 Views ⚑0
Disney World restaurants hacked; credit card data leaked
A data breach affected for half a year multiple franchises owned by Landry’s Inc., a popular restaurant corporation that operates throughout the US territory, including several franchises operating in the world-famous amusement park Disney World. Although this cybersecurity incident affected only restaurants off-site at Disney World, amusement park visitors need to be alert to any suspicious activity related to their payment cards.
The data breach would have affected all payment
cards used between March 13 and October 17, 2017 at affected restaurants. It is
important to note that frequent user cards were not compromised during the
After a number of rumors, the company released
a statement related to the cybersecurity incident: “We are notifying our
customers of an incident related to their payment card data security: this
information would have been stolen due to an error in the payment devices used
by our staff.”
The company added that they identified a variant
for the theft of payment card data present in its networks, although they claim
that their points of sale have end-to-end encryption technology, so even though
this information was compromised it is useless for the hackers as they found it.
Even when the exposed information is encrypted,
making it unreadable to hackers, cybersecurity specialists recommend to all
those who have used their payment cards at a Landry’s restaurant to take some
steps to protect themselves completely from any malicious activity related to
this data breach.
One of the main protection measures in cases
like this is the activation of a credit monitoring and fraud prevention
service. If the company that suffered the data breach has not offered it to its
users, it is recommended to activate it individually, in addition to constantly
checking your statements for any suspicious transactions.
The International Institute of Cyber Security (IICS)
also recommends enabling security alerts so that credit companies identify
suspicious activity in real time, greatly reducing the time margin for
criminals to deploy fraudulent transactions using stolen bank details.
He is a well-known expert in mobile security and malware analysis. He studied Computer Science at NYU and started working as a cyber security analyst in 2003. He is actively working as an anti-malware expert. He also worked for security companies like Kaspersky Lab. His everyday job includes researching about new malware and cyber security incidents. Also he has deep level of knowledge in mobile security and mobile vulnerabilities.