Rutter’s Hit By Credit Card Stealing Malware – Privacy Expert Comments

Rutter’s, the convenience store, fast food restaurant, and gas station chain owner, has disclosed that 71 locations were infected with a point-of-sale (POS) malware that was used by attackers to steal customers’ credit card information. Rutter’s disclosed in a Notice of Payment Card Incident that it found evidence indicating that some payment card data from cards used on point-of-sale (POS) devices from convenience stores and fuel pumps were accessed by an unauthorized actor using malware installed on the payment processing systems.

Subscribe
Notify of
guest

1 Expert Comment
Most Voted
Newest Oldest
Inline Feedbacks
View all comments
Paul Bischoff
Paul Bischoff , Privacy Advocate
InfoSec Expert
February 17, 2020 12:32 pm

The POS malware attack on Rutters should serve as a reminder for consumers to avoid using magnetic strip readers for credit card payments and instead opt for those that use tap or EMV chips. Whether a criminal uses malware or a physical card skimmer, EMV chips and will prevent all of your credit card details being stolen. Victims who used EMV chips at Rutters still had their credit card numbers stolen, but their verification codes and names were not. Gas station pumps often use the old magnetic strip readers, so it\’s often preferable to pay inside where you can use an EMV chip instead of at the pump.

Everyone who has paid with a credit card at Rutters should keep an eye on their credit card activity and report any suspicious transactions to their bank. Don\’t ignore charges of a few cents—criminals will often do this just to make sure the card is still valid before selling the card info to someone who will use it for much larger purchases later.

Last edited 2 years ago by Paul Bischoff
Information Security Buzz
1
0
Would love your thoughts, please comment.x
()
x