Credential theft
P.F. Chang's POS Malware Breach β 2 Million Payment Cards (FIN6)
Primary Source βIncident Details
P.F. Chang’s China Bistro, a national casual dining restaurant chain, confirmed in June 2014 that it had suffered a payment card breach after KrebsOnSecurity reported that a large batch of stolen cards β dubbed ‘Eataly’ by underground card shops β was traced back to P.F. Chang’s locations. The breach involved POS malware installed on restaurant systems that scraped payment card track data from memory during transactions. The malware was active from approximately September 2013 through June 2014, affecting approximately 33 P.F. Chang’s restaurant locations. An estimated 2 million payment cards were compromised. After discovering the breach, P.F. Chang’s switched to manual card imprinting at all US restaurant locations while it cleaned and rebuilt its POS infrastructure β a highly visible response that drew media attention. The company worked with the Secret Service and engaged security firm Mandiant for forensic investigation. The breach was attributed to FIN6, a financially motivated threat actor known for targeting retail and hospitality POS systems. P.F. Chang’s settled class-action lawsuits. The incident highlighted the restaurant sector’s particular vulnerability to POS malware, as restaurants frequently process high volumes of payment cards with systems that may lag in patching and network segmentation compared to large retailers.
Technical Details
- Initial Attack Vector
- POS malware β attackers compromised P.F. Chang's corporate network and installed RAM-scraping malware on point-of-sale systems at restaurant locations; the specific initial network intrusion vector was not fully disclosed
- Malware Family
- POS RAM-scraping malware
Timeline
- 2013-09-01 Breach occurred
- 2014-06-10 Publicly disclosed
- 2014-06-12 Customers notified