Credential theft
P.F. Chang's POS Malware Breach (2M Cards, FIN6)
Primary Source βIncident Details
P.F. Chang’s China Bistro, a US casual dining restaurant chain, confirmed in June 2014 that its payment systems had been compromised by POS malware for approximately 9 months (September 2013 to June 2014). The breach was discovered when batches of stolen P.F. Chang’s customer credit and debit card data began appearing for sale on underground carding forums in early June 2014 β the same Rescator carding marketplace that sold Target and Home Depot breach data. Approximately 2 million payment cards from 33 P.F. Chang’s locations across the United States were compromised. The attack was attributed to the FIN6 cybercrime group. Upon discovering the breach, P.F. Chang’s switched to manual card imprinting at its restaurants β an inconvenient but effective stopgap measure. Exposed data included payment card numbers, expiration dates, and cardholder names from magnetic stripe reads. P.F. Chang’s engaged the US Secret Service and multiple cybersecurity firms. The breach was part of a broader wave of restaurant and retail POS malware attacks in 2013β2014 (Target, Home Depot, Neiman Marcus, Michaels, Chili’s parent Brinker International, etc.).
Technical Details
- Initial Attack Vector
- FIN6 cybercrime group deployed POS malware on P.F. Chang's restaurant payment systems; malware captured Track 1 and Track 2 magnetic stripe data from in-store transactions over approximately 9 months
- Malware Family
- POS malware (FIN6)
Timeline
- 2013-09-01 Breach occurred
- 2014-06-13 Publicly disclosed
- 2014-06-13 Customers notified