DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Millennium Hotels & Resorts North America Informed of Potential Data Security Incident

Posted on August 25, 2016 by Dissent

The Secret Service alerts you, a vendor notifies you… do we really think this is just a “potential” data security incident? Their press release:

Millennium Hotels & Resorts North America (MHR) has become aware of a data security incident involving food and beverage point of sale systems at 14 of its hotels in the United States.

The company advises customers to review their payment card account statements closely and to report unauthorized charges to their card issuer immediately. Payment card rules generally provide that cardholders are not responsible for unauthorized charges that are reported in a timely manner.

The company has engaged third-party cyber forensic experts to investigate the incident. To date, the investigation has not identified the presence of “malware” on any MHR systems. Initial information suggests that the incident affected point of sale systems that processed customer card payments — primarily within food and beverage facilities operating at the hotels — between early March, 2016 and mid-June, 2016.

MHR originally was notified of the incident by the U.S. Secret Service and took immediate steps to investigate and isolate the card processing elements of the affected point of sale systems, which were promptly taken offline.

Subsequently, MHR was notified by a third-party service provider — that supplies and services the affected point of sale systems — that it had detected and addressed malicious code in certain of its legacy point of sale systems, including those used by MHR. MHR immediately adopted additional security measures as recommended by the third party service provider.

The affected point of sale systems are separate from other MHR systems, including MHR’s hotel property management and booking systems. The results from MHR’s current investigation do not indicate compromise of those other systems.

Shaun Treacy, President, North American for MHR, said: “We urge customers who visited our U.S. hotels between early March and the end of June this year to check their payment card records and to report dubious transactions to their card operators immediately. We also urge customers to take advice from their card operators on any further recommended security precautions. The Millennium Hotels & Resorts team, above all, values its customer relationships and is committed to protecting customers’ payment card information. Since being informed of this incident, we have taken a number of steps to ensure that this commitment is met in full.”


Related:

  • UN Cybercrime Convention to be signed in Hanoi to tackle global offences
  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Toys “R” Us Canada customers notified of breach of personal information
  • Gatineau gymnastics centre warns members of possible data breach
  • Data breach in 42 Latvian municipalities: DVI imposes 300,000 euro fine on ZZ Dats
Category: Business SectorHackOf NoteSubcontractorU.S.

Post navigation

← UK: Northern Irish nursing home fined by Information Commissioner’s Office
NJ: Monmouth County Man Charged With Submitting Fraudulent Health Insurance Claims in the Name of the Doctor He Worked For, Then Stealing the Insurance Checks When the Claims Were Paid →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.