Several restaurants have been hit by a credit card breach following a hack of the processing system.
According to West Lafayette news website wlfi.com, the Camille's Sidewalk Cafe restaurants in the area were affected after Camilles's parent company, Beautiful Brands International was hacked.
It was unclear how many people were affected but all were customers at the restaurants. Robert Sartin, attorney for Beautiful Brands International, claimed that the security breach had affected about five local financial institutions to the scale of more than $100,000, but he had not seen a local debit or credit card complaint for several weeks.
He also commented that the credit and debit card breach has likely affected fewer than 20 stores across the country, and the issue had not been linked to any employees or owners of Camille's restaurants, or any employees at Beautiful Brands.
He said: “We are working with Visa and MasterCard and the United States Secret Service to stop that breach and prosecute the people responsible. We believe based on the evidence we've seen so far that computer hackers have infiltrated the credit card processing system. And we believe that we'll be able to stop that in the future.”
He also commented that the company hopes to contain the problem nationally within a couple of weeks, and the investigation into who was behind the crimes would be complete shortly after.
Sai Chintala, vice president of technical services at AppLabs, said: “Three quarters of vulnerabilities happen when a customer is creating applications, and from that aspect it is not simple. In the last five years we have seen analysis of code review in the security development lifecycle, it is better but it is not complete as developers are still catching up.
“Every week there is a new threat, and it should be a constant exercise. Keep track of your vulnerabilities and threats and update your solutions to know that you are able to protect yourself.”
Asked how providers can protect themselves from hackable flaws, Chintala said: “It happens with poor processes, poor configuration and with a web application that is poorly configured. This story does show some weak behaviour; compliance analysis needs to be done within the design and checking process to check the strength of the applications regularly as there are so many vulnerabilities in the industry.”