Credential theft

P.F. Chang's POS Malware Breach (2M Cards, FIN6)

πŸ“… 2013-09-01 🦠 POS malware (FIN6)
Primary Source β†—

Incident Details

P.F. Chang’s China Bistro, a US casual dining restaurant chain, confirmed in June 2014 that its payment systems had been compromised by POS malware for approximately 9 months (September 2013 to June 2014). The breach was discovered when batches of stolen P.F. Chang’s customer credit and debit card data began appearing for sale on underground carding forums in early June 2014 β€” the same Rescator carding marketplace that sold Target and Home Depot breach data. Approximately 2 million payment cards from 33 P.F. Chang’s locations across the United States were compromised. The attack was attributed to the FIN6 cybercrime group. Upon discovering the breach, P.F. Chang’s switched to manual card imprinting at its restaurants β€” an inconvenient but effective stopgap measure. Exposed data included payment card numbers, expiration dates, and cardholder names from magnetic stripe reads. P.F. Chang’s engaged the US Secret Service and multiple cybersecurity firms. The breach was part of a broader wave of restaurant and retail POS malware attacks in 2013–2014 (Target, Home Depot, Neiman Marcus, Michaels, Chili’s parent Brinker International, etc.).

Technical Details

Initial Attack Vector
FIN6 cybercrime group deployed POS malware on P.F. Chang's restaurant payment systems; malware captured Track 1 and Track 2 magnetic stripe data from in-store transactions over approximately 9 months
Malware Family
POS malware (FIN6)

Timeline

  1. 2013-09-01 Breach occurred
  2. 2014-06-13 Publicly disclosed
  3. 2014-06-13 Customers notified