Breach, Threat Management, Data Security, Malware, Network Security

Wendy’s POS breach ‘considerably’ bigger than first thought

Even more fast-food patrons may have a beef with The Wendy's Company, after the restaurant chain announced yesterday that the total number of restaurants affected by a point-of-sale data breach discovered last February may be “considerably higher” than originally thought.

Wendy's had previously reported in May that the malware found on certain franchised locations' POS systems affected fewer than 300 North American locations, with another 50 locations also suspected of experiencing unspecified cybersecurity issues. Victims who purchased food at these locations had their payment card data stolen and used fraudulently at other merchants.

However, according to a new press statement from Wendy's, further investigation into the incident has turned up a variant that is “similar in nature to the original but different in its execution.” This variant, which Wendy's described as “extremely difficult to detect,” was uploaded via a remote access tool to a second POS system that was not previously known to be infected. Though Wendy's did not provide any figures, the company did admit that the total number of victimized franchise restaurants is now much higher than once thought.

Wendy's emphasized that no company-operated restaurants appear to be impacted, and explained that the franchise locations were likely affected as a result of attackers stealing credentials from third-party service providers who help maintain and support franchisees' POS systems.

Adam Levin, chairman and founder of identity theft firm IDT911, was critical of Wendy's statement. “Wendy's is quick to deflect blame and point the finger at franchisees and third-party service providers, and continues to make excuses by claiming the malware used by attackers is ‘highly sophisticated' and ‘extremely difficult to detect,'” said Levin in a statement provided to “By downplaying the severity of the breach, Wendy's runs the risk of further compromising its reputation and has put tens of thousands of consumers in jeopardy.”

Jonathan Cran, vice president of operations at cybersecurity crowdsourcing service Bugcrowd, added in his own statement to, “It's surprising we don't see more follow-on breach announcements like this. Once an attacker is in and laterally moving throughout the network, it can be very difficult to fully contain and remove their access. Attackers are going after sources of magnetic stripe credit card data as consumers move to EMV "chip" cards. While EMV was not designed to prevent malware (ram scraper) attacks, in practicality, these cards would probably have protected consumers in this case." 

Bradley Barth

As director of multimedia content strategy at CyberRisk Alliance, Bradley Barth develops content for online conferences, webcasts, podcasts video/multimedia projects — often serving as moderator or host. For nearly six years, he wrote and reported for SC Media as deputy editor and, before that, senior reporter. He was previously a program executive with the tech-focused PR firm Voxus. Past journalistic experience includes stints as business editor at Executive Technology, a staff writer at New York Sportscene and a freelance journalist covering travel and entertainment. In his spare time, Bradley also writes screenplays.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.