Security Central: Kimpton Hotels Experience Major Breach, U.S. Uncovers Truths About DNC Attacks
If you’re a VAR or security service provider, you might want to look toward the hospitality industry for new customers. Kimpton Hotels announced on Wednesday that it has joined the growing list of hotel operators that have fallen prey to hackers, specifically in the form of malware that goes after customer payment card info.
September 2, 2016
If you’re a VAR or security service provider, you might want to look toward the hospitality industry for new customers. Kimpton Hotels announced on Wednesday that it has joined the growing list of hotel operators that have fallen prey to hackers, specifically in the form of malware that goes after customer payment card info. According to a statement released by the hotel chain, credit cards were breached at over 60 restaurants and hotel front desks between the months of February and July of this year.
Kimpton said that the malware was designed to go after sensitive information such as card numbers, cardholder names, expiration dates and verification codes. The hotel launched an investigation after it was informed of “unauthorized charges occurring on payment cards after they had been used by guests at the restaurant in one of our hotels” back in July.
According to investigative reporter Brian Krebs, “The source and extent of the apparent breach at Kimpton properties is still unknown.” Unknown perhaps, but it’s not hard to guess. Based on recent retail and hotel hack patterns, Point-of-sale (POS) malware is the likely culprit. This type of malware has been the cause of the majority of credit card breaches over the past two years, even successfully taking down huge companies – a prime example being the seismic 2013 breaching of Target stores.
On top of everything, these breaches, small- or large-scale, are almost too easy to carry out. Once cyber-crooks have the malware loaded onto the POS systems, they can remotely access the information of each card swiped at that register.