Fast-food chain has hired a forensics firm to help determine the problem Wendy’s, one of the nation’s largest fast-food chains, says they’re investigating a possible breach of their POS systems after banking industry contacts alerted them to unusual activity on customer cards.Bob Bertini, a spokesperson for Wendy’s told investigative journalist Brian Krebs, the company had received reports from payment industry contacts concerning “unusual activity involving payment cards at some of our restaurant locations.”“Reports indicate that fraudulent charges may have occurred elsewhere after the cards were legitimately used at some of our restaurants. We’ve hired a cybersecurity firm and launched a comprehensive and active investigation that’s underway to try to determine the facts.”Bertini said that the company began investigating the reports immediately, and that the time frame they’re working with is late 2015. However, it’s too soon to know the actual scope of the incident. Until more information emerges, most experts agree the public should avoid hype and speculation. This could impact a few stores, or it could impact Wendy’s as a whole.“Keeping in mind that traditionally, big corporations and retailers use franchised-based models, in many cases their security in different branches is absolutely decentralized on practice. This allows bad actors to take advantage of such insecurities and successfully distribute malware on terminals in order to collect Track 2 data, and to perform intrusions into their targeted networks for data exfiltration,” said the Andrew Komarov, Chief Intelligence Officer at InfoArmor. In truth, many POS systems have not been upgraded for years. In anticipation of ‘chip and sign’ changes to credit cards, some vendors have held off even longer, waiting for the latest technology to upgrade, explained Simon Crosby, the CTO of Bromium.“The bad guys today know the world is changing, and they’re out to milk their current attacks for all they are worth before they have to change tack. A simple rule of thumb: If a vendor does not support chip and sign, pay cash,” he added.If confirmed, then Wendy’s is in good company when it comes to retail and fast-food breaches. Looking back, Jimmy Johns, Landry’s (Mortons, Rainforest Cafe), P.F. Chang’s, and Dairy Queen all had a common link between their security incidents, the attackers focused on individual stores and POS systems in order to capture card data.“One of the most important things to note here is that it’s often a merchant bank or individual cardholder working in collaboration with a reporter (Krebs) to disclose the issue publicly. This either indicates that the organizations are either withholding or, more likely, have limited or no knowledge of the breach. Given the distributed nature of these systems, and the lack of tooling, the breaches are difficult to detect prior to exfiltration of the information,” said Jonathan Cran, the VP of Operations, Bugcrowd.“Also worth noting, as the frequency of these breaches is increasing, there may be a rush from the underground to collect non-EV cards before all retailers mandate them. EV chips will help prevent actual card duplication, but they won’t prevent online (card not present) theft.” Related content news Gwinnett Medical Center investigating possible data breach After being contacted by Salted Hash, Gwinnett Medical Center has confirmed they're investigating a security incident By Steve Ragan Oct 02, 2018 6 mins Regulation Data Breach Hacking news Facebook: 30 million accounts impacted by security flaw (updated) In a blog post, Facebook’s VP of product management Guy Rosen said the attackers exploited a flaw in the website's 'View As' function By Steve Ragan Sep 28, 2018 4 mins Data Breach Security news Scammers pose as CNN's Wolf Blitzer, target security professionals Did they really think this would work? By Steve Ragan Sep 04, 2018 2 mins Phishing Social Engineering Security news Congress pushes MITRE to fix CVE program, suggests regular reviews and stable funding After a year of investigation into the Common Vulnerabilities and Exposures (CVE) program, the Energy and Commerce Committee has some suggestions as to how it can be improved By Steve Ragan Aug 27, 2018 3 mins Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe