T-REX, Rainforest Cafe, Yak & Yeti Restaurant, and More Involved in Landry’s Credit Card Breach at Walt Disney World
In a recent report from Landry’s Inc., a number of their restaurants have been impacted by a credit card breach, and that includes two of their Disney Springs restaurants and one Disney’s Animal Kingdom restaurant. Potentially affected restaurants include the following brands: Rainforest Cafe, T-REX Cafe, Yak & Yeti Restaurant, Bubba Gump Shrimp Co., and more.
The Houston-based company operates over 60 restaurant chains nationwide, and has informed customers that a credit card breach has affected cards swiped between March 13 and Oct. 17, 2019.
The breach took place when waitstaff swiped cards on devices used to enter kitchen and bar orders, which are different devices than the point-of-sale terminals used for payment processing. Landry’s Select Club rewards cards were not involved in the breach.
From the Landry’s, Inc. release:
Landry’s recently detected unauthorized access to the network that supports our payment processing systems for restaurants and food and beverage outlets. We immediately launched an investigation, and a leading cybersecurity firm was engaged to assist. Although the investigation identified the operation of malware designed to access payment card data from cards used in person on systems at our restaurants and food and beverage outlets, the end-to-end encryption technology on point-of-sale terminals, which makes card data unreadable, was working as designed and prevented the malware from accessing payment card data when cards were used on these encryption devices. Besides the encryption devices used to process payment cards, our restaurants and food and beverage outlets also have order-entry systems with a card reader attached for waitstaff to enter kitchen and bar orders and to swipe Landry’s Select Club reward cards. In rare circumstances, it appears waitstaff may have mistakenly swiped payment cards on the order-entry systems. The payment cards potentially involved in this incident are the cards mistakenly swiped on the order-entry systems.
The malware searched for track data (which sometimes has the cardholder name in addition to card number, expiration date, and internal verification code) read from a payment card after it was swiped on the order-entry systems. In some instances, the malware only identified the part of the magnetic stripe that contained payment card information without the cardholder name. The general timeframe when data from cards mistakenly swiped on the order-entry systems may have been accessed is March 13, 2019 to October 17, 2019. At a small number of locations, access may have occurred as early as January 18, 2019. A full list of Landry’s owned restaurants and food and beverage outlets involved is available here.
It is always advisable for individuals to closely monitor their payment card statements for any unauthorized activity. Customers should immediately report any unauthorized charges to the financial institution that issued the card because payment card rules generally provide that cardholders are not responsible for unauthorized charges reported in a timely manner. The phone number to call is usually on the back of the payment card. Please see the section that follows this notice for additional steps you may take.
During the investigation, we removed the malware and implemented enhanced security measures, and we are providing additional training to waitstaff. In addition, we continue to support law enforcement’s investigation.
If you have any questions, please call 833-991-1538 from 8:00 a.m. to 8:00 p.m. CT, Monday through Friday.