News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
You are here: Home / Network Security / Ransom Sought in Domino's Data Breach
Gartner's #1 for endpoint backup
Ransom Sought in Domino's Pizza Data Breach Overseas
Ransom Sought in Domino's Pizza Data Breach Overseas
By Jennifer LeClaire / NewsFactor Network Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
JUNE
16
2014



Hackers are seeking a relatively modest ransom from Domino's Pizza in Europe after claiming they stole more than 600,000 customer records from the company's database.

The hackers seek 30,000 euros -- about $41,000 -- or they say they will release the personal details of the company's customers.

"We downloaded over 592,000 customer records (including passwords) from French customers and over 58,000 records from Belgian ones," claimed a group calling itself Rex Mundi. "That's over six hundred thousand records, which include the customers' full names, addresses, phone numbers, e-mail addresses, passwords and delivery instructions."

But Domino's is not so easily intimidated. In a published statement, the company said the data hacking is isolated to the Domino's franchise in France and Belgium, and no customer credit card or financial information was compromised.

"Domino's customers in the UK and Republic of Ireland are not affected by this incident," the company said. "The security of customer information is very important to us. We regularly test our UK Web site for penetration as part of the ongoing rigorous checks and continual routine maintenance of our online operations."

Ransom Techniques on the Rise

We caught up with Tim "TK" Keanini, chief technology officer at security software firm Lancope, to get his take on the Domino's event. He told us ransoming of all types, including ransomware, is on the rise because the invention of crypto currency like bitcoin allows hackers to be paid without compromising their anonymity.

"While retail has been in the news lately with a lot of data breaches, if you have a lot of personal data on people, the more people you have, the more attractive you are to these criminals," he said. "If you have not been hit yet, now is the time to prepare with an incident response readiness that will ensure business continuity. It is just a part of doing business in this age of the Internet."

What about Domino's in particular? Keanini said the pizza chain needs to treat this event as an ongoing business problem and not as a one-time event.

"They should provide leadership and expertise to all of their stores and deliver the operational visibility required to ensure early detection of this type of threat," he said. "While getting in again is likely, they must raise the cost to this adversary to hide and operate."

When Will We Learn?

We also turned to Mark Hickman, chief operations officer at encryption vendor WinMagic, to get his thoughts on the latest in a long string of breaches. He told us given all the news with various hacks, it shocking that many large brands have not done the right checks and balances to ensure the security of their data.

"Regardless of whether an encryption solution could have prevented this, the fact is that organizations need to take closer looks for holes in their security now more than ever," Hickman said. "It'd be disconcerting for customers and the organizations that this happens to, and reinforces the need for strong security best-practices."

Tell Us What You Think
Comment:

Name:

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY BE OF INTEREST
IT departments are embracing cloud backup, but there's a lot you need to know before choosing a service provider. Learn all the critical things you need to know by accessing the white paper, "5 Things You Didn't Know About Cloud Backup". Access the White Paper now.
MORE IN NETWORK SECURITY
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Russian Gang with Stolen IDs Hacks Hosting Company
In August, a Russian cyber gang obtained what researchers called “the largest cache of stolen data." Now, those hackers may be putting their ill-gotten gains to criminal use.
 
Dairy Queen Latest Retailer To Report Hack
Known for its hot fries and soft-serve ice cream, Dairy Queen just made cyber history as the latest victim of a hack attack. The fast food chain said that customer data at some stores may be at risk.
 
Lessons from the JPMorgan Chase Cyberattack
JPMorgan Chase is investigating a likely cyberattack. The banking giant is cooperating with law enforcement, including the FBI, to understand what data hackers may have obtained.
 

Enterprise Hardware Spotlight
AMD's New FX Series CPU Breaks Processing Speed Record
The new FX-8370 processor from Advanced Micro Devices has set a record for silicon processor speed, the company announced. Overclocked, the eight-core chip was measured at 8722.78 MHz.
 
Intel Intros Lightning-Fast PC Processors
Call it extreme. Intel just took the covers off its first-ever eight-core desktop processor, which is aimed at hardcore power users who expect more than the status quo from their computers.
 
HP Previews ProLiant Gen9 Data Center Servers
Because traditional data center and server architectures are “constraints” on businesses, HP is releasing new servers aimed at faster, simpler and more cost-effective delivery of computing services.
 

Mobile Technology Spotlight
Rumor Mill Puts Mobile Wallet in iPhone 6
Apple is moving toward the mobile wallet world with its next iPhone. The tech giant has partnered with retailers, banks and major payment networks to make it happen, according to Bloomberg.
 
Will iPhone Finally Catch Up with NFC Mobile Payment Ability?
Apple's latest version of the iPhone may have a mobile wallet to pay for purchases with a tap of the phone. The iPhone 6 reportedly is equipped with near-field communication (NFC) technology.
 
Visual Search To Shop: Gimmick or Game Changing?
Imagine using your phone to snap a photo of the cool pair of sunglasses your friend is wearing and instantly receiving a slew of information about the shades along with a link to order them.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech | Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.