[24]7.ai Issues Statement After Data Breach Affecting Delta & Sears

SAN JOSE, Calif., April 4, 2018 /PRNewswire/ — [24]7.ai discovered and contained an incident potentially affecting the online customer payment information of a small number of our client companies, and affected clients have been notified. The incident began on Sept. 26, and was discovered and contained on Oct. 12, 2017. We have notified law enforcement and are cooperating fully to ensure the protection of our clients and their customers’ online safety. We are confident that the platform is secure, and we are working diligently with our clients to determine if any of their customer information was accessed.

About [24]7.ai
[24]7.ai is redefining the way companies interact with consumers. Using artificial intelligence and machine learning to understand consumer intent, the company’s technology helps companies create a personalized, predictive and effortless customer experience across all channels. The world’s largest and most recognizable brands are using intent-driven engagement from [24]7.ai to assist several hundred million visitors annually, through more than 1.5 billion conversations, most of which are automated. The result is an order of magnitude improvement in digital adoption, customer satisfaction, and revenue growth. For more information, visit: http://www.247.ai.

[24]7 and [24]7.ai are trademarks of [24]7.ai, Inc. All other brands, products or service names are or may be trademarks or service marks of their respective owners.


Information related to the statement from other sources is below. The company systems were not compromised, but rather they were all using [24]7.ai’s customer service chat widget to interact with customer service personnel, which can result in end users inputting payment card and other personal data.

Delta said a small number of its customers saw their payment information stolen by hackers. The company was alerted to the data breach last week. Sears also said under 100,000 card numbers were taken.

Service Provider [24]7.ai Breached, Leaking Customer Data from Delta Airlines, Sears, Kmart, and Best Buy


Delta Data Breach 2018: Was Your Payment Info Exposed?

Final note. Need a secure payment solution for your chat widget? Call now.

Verifone Investigating Data Breach

Reported by Krebs on Security, Verifone is investigating a breach of its internal computer networks that appears to have impacted a number of companies running its point-of-sale solutions. Verifone says the extent of the breach was limited to its corporate network and that its payment services network was not impacted.

“According to the forensic information to-date, the cyber attempt was limited to controllers at approximately two dozen gas stations, and occurred over a short time frame. We believe that no other merchants were targeted and the integrity of our networks and merchants’ payment terminals remain secure and fully operational.”

Read the full article here https://krebsonsecurity.com/2017/03/payments-giant-verifone-investigating-breach/

Oracle Micros Data Breach

Micros, a hugely popular restaurant and hospitality is the subject of a major data breach investigation. On Monday, 8 August 2016, Oracle Security informed Oracle MICROS customers that it had detected malicious code in certain legacy MICROS systems. Oracle is currently investigating the compromise.

Micros is used by many of the large hotel brands as well as restaurants. Over the last year, many in the hospitality industry have announced data breaches, though a link between the two has not been announced.


Visa Compromise Notification (Micros)

Data Breach At Oracle’s MICROS Point-of-Sale Division (krebsonsecurity.com)

Optimal Payments data breach

(Reuters) – British mobile payments company Optimal Payments Plc said it was investigating allegations that personal data belonging to some of its customers had been compromised and was available in the public domain.

Optimal shares fell 11 percent to 309.5 pence, their sharpest fall in a day this year and lowest since Sept. 16.

The company said the allegations were that the data breaches had occurred at two of its units in 2012 or earlier.

The data consists of names and email addresses of customers and is available for purchase on the “dark web”, a source with knowledge of the hack told Reuters.

The dark web is an area of the Internet that can only be accessed through software that makes web browsing anonymous.

Optimal’s NETELLER and Moneybookers Ltd units had suffered data breaches as a result of cyber attacks in 2009 and 2010, but none of its customers lost any money as a result, the company said.

Optimal said it had informed the Information Commissioner and the Financial Conduct Authority (FCA) about the matter.

The company said it came to know about the allegations following media enquiries.

(Reporting By Mamidipudi Soumithri in Bengaluru; Editing by Anupama Dwivedi and Gopakumar Warrier)

List of Credit Card Data Breaches by Industry

data breach credit cardUpdated September 2018, not all inclusive. Is your business safe from a credit card data breach? The list below highlights some credit card data breaches and the primary cause. While malware reigns as a top cause of payment data breaches, employee theft is still a problem too.

Software & POS companies

  • FastBooking– hotel booking website, 4,000 partner hotels in 100 countries
  • PumpUp fitness app- user-entered health information, photos, and private messages sent between users. The exposed data also contained Facebook access tokens and, in some cases, unencrypted credit card data including card numbers, expiry dates and card verification values. 6 million records, disclosed May 2018 (Based on data, probably exposed for all time)
  • Sabre SynXis Central Reservations system- About 36,000 hotels use SynXis, not all cards were compromised. August 2016 to March 2017.
  • 247.ai Chat provider with payment acceptance for big companies like Delta, Best Buy, Sears and others. You don’t need to have used the online chat software to be affected potentially. Sept. 26-Oct. 12, 2017
  • Modern Business Solutions (hosting) October 2016, 26-260 million
  • Staminus – March 2016. Stored card data stolen from hacked server.
  • Harbortouch POS – ” a small percentage of their restaurants and bars customers”; Malware. May 2015 announced; scope and exposure dates under investigation. 4200 merchants, how many cardholders?
  • NEXTEP Systems- vendor of point-of-sale solutions for restaurants, corporate cafeterias, casinos, airports and other food service venues, was recently notified by law enforcement that some of its customer locations have been compromised in a potentially wide-ranging credit card breach. March 2015
  • Advanced Restaurant Management Applications – mostly in Colorado. 2015
  • Charge Anywhere LLC, a mobile payments provider. November 2009 and September 2014
  • Signature Systems Inc., 2014 point-of-sale vendor. 216 Jimmy John’s stores and 108 other independent restaurants locations. Malware installed remotely.
  • SP +  POS malware 2014
  • Moolah Payments 2014
  • Information System & Supplies, Inc., 2014 independent reseller of POS products. Unnamed restaurant customers.
  • Paytime Inc., 2014, a Pennsylvania payroll company
  • Big Tree Solutions- 2014 see Bring it to me below (breach not reported, but susceptible)
  • Datapak Services Corporation-2013,  order fulfillment provider and payment processor for several Web sites
  • Heartland Payment Systems 2008-2009, 130 millionModern Business Solutions (hosting) 2016, 26-260 million


  • Bulloch Pediatrics Group – 2014 burgled storage with old records
  • Specialized Eye Care, 2014, insider breach of card numbers and checking account info
  • McBroom Clinic- payment data on portable flash drive sent to vendor along with other materials; vendor presumably discarded USB without seeing


  1. Lord & Taylor, Saks Fifth Avenue and Saks Off 5th (parent Hudson Bay) point of sale, total system compromise per class action during the breach period of March 2017 to March 2018over 5 million card records. April 2018.
  2. Forever 21- Malware was installed on some point of sale (POS) systems in stores across the U.S. at varying times between April 3, 2017, and November 18, 2017. However, records prior to that may also have been compromised via logs
  3. Home Depot, 2014, “BlackPOS” (a.k.a. “Kaptoxa”) malware, 56 million
  4. Staples, 2014 over 1 million cards. subset of Staples locations, including seven Staples stores in Pennsylvania, at least three in New York City, and another in New Jersey.
  5. Michael’s, POS malware
  6. Target 2013, “BlackPOS” (a.k.a. “Kaptoxa”) malware, 93 million
  7. Goodwill, POS malware, over 800,000
  8. Bebe – U.S., Puerto Rico and U.S. Virgin Islands stores between Nov. 8, 2014 and Nov. 26, 2014
  9. Kmart – 2014. Point-of-sale registers at its Kmart stores were compromised by malicious software
  10. Sally Beauty Supply, 2014, over 250,000 cards, malware
  11. Neiman Marcus, Thanksgiving 2013 to Dec. 15, over 40 Million cards, POS malware
  12. Sheplers, 2014 hacked POS
  13. Dreslyn. 2014 unknown
  14. Victoria’s Secret, Orlando location employee card skimming
  15. Aaron Brothers. 2014, over 400,000
  16. Rosenthal the Malibu Estates, 2014 malicious software
  17. Harbor Freight Tools, 2013 a U.S.-based chain of 400 retail tool stores

Hotels  & Travel

  1. See Sabre SynXis for software. Huge hotel impact, August 2016 to March 2017.
  2. Prince hotels, 124,000 for foreign booking; the English, Chinese and Korean website, run by Fastbooking Co., was hacked on June 15 and 17, 2018.
  3. Trump Hotel Collection reportedly breached again
  4. Rosen Hotels & Resorts, Sept. 2, 2014, and Feb. 18, 2016 compromised payment card network
  5. Hyatt- over 250 hotels, discovered in Nov. 2015 involved POS malware
  6. Starwoods Hotel & Resorts, discovered in Nov. 2015, POS malware
  7. 9/28/2015 Banks pointing fingers at Hilton properties, including Embassy Suites, Doubletree, Hampton Inn and Suites, and the upscale Waldorf Astoria Hotels & Resorts. Hilton announced multiple intermittent breaches in 2014 and 2015
  8. Hard Rock Hotel Las Vegas “limited to credit or debit card transactions between September 3rd, 2014 and April 2nd, 2015 at restaurant, bar and retail locations at the Hard Rock Hotel Las Vegas property, including the Culinary Dropout Restaurant.”
  9. March 2015 Mandarin Oriental Hotel, Malware. Credit card systems in an isolated number of hotels in the US and Europe.
  10. From White Lodging Services Corp- certain Marriott, Holiday Inn, Sheraton and other hotel properties. The breach occurred at food and beverage outlets at 14 hotels, including some operated under the Westin, Renaissance and Radisson names, between March 20 and December 16, 2013.
  11. Presidian Hotels & Resorts
  12. Grand Casino Mille Lacs 2014
  13. Houstonian Hotel, Club & Spa, 2014 over 10,000, Malicious software attack
  14. South San Francisco 2014Embassy Suites Hotel
  15. Travelocity 2013, several employees of a Travelocity service
    provider misused certain information, including payment card numbers,  for which they had access as part of performing services
  16. Intercontinental Mark Hopkins San Francisco, 2013


  1. Walmart partner MBM Company Inc., which operates Limogés Jewelry. For purchases made between 2000 and early 2018
  2. Orbitz March 2018, over 800,000 personal information — including full names, credit card numbers, phone numbers, and e-mail and street addresses
  3. Sears  [24]7.ai data breach. Under 100,000, April 2018
  4. Delta [24]7.ai data breach April 2018
  5. Adidas 2018 millions
  6. Macy’s April 26 and June 12, 2018
  7. fashiontofigure.com Fashion Figure (B. Lane, Inc.). Has 18 retail stores plus ecommerce store; no clear indication where breach occurred. Reported as Date(s) of Breach (started):Tuesday, May 19, 2015; Date(s) of Discovery of Breach:Friday, October 16, 2015. Fashion Figure is notifying customers of a data breach to their system when they discovered unauthorized access to names, customer ID’s, addresses, phone numbers, email addresses, and credit card information. After investigation, the company found malware installed on their webserver. The web configuration is not known at the time of the breach, and most companies take immediate action to update once discovered; Ecommerce shopping cart is currently Magento with Magento One Page Checkout – Fire Checkout plugin, and authorize.net payment gateway.
  8. http://www.northshorecare.com/ North Shore Care Supply. The information accessed included debit/credit card information, names, addresses, card numbers, verification codes and expiration dates.Online purchases made between June 7, 2015 and August 24, 2015 are at risk.  The web configuration is not known at the time of the breach, and most companies take immediate action to update once discovered; Ecommerce shopping cart is currently Magento with iframe authorize.net payment gateway.
  9. Web.com August 2015, reportedly 7 years of data, 93000 records
  10. Accuform Signs November 2, 2015
  11. onestopparking.com 2014
  12. Park-n-Fly.com 2014
  13. Sourcebooks, 2014 Web site shopping cart software
  14. Dutchwaregear.com 2014
  15. simmsfishing.com 2014 webhost malware
  16. duluthpack.com, 2014 malware
  17. backcountrygear.com 2014 malware
  18. American Soccer Company, Inc. / SCORE, 2014 malware
  19. Evolution Nature Corp., d/b/a The Evolution Store, 2014 malware
  20. Flinn Scientific, Inc, 2014 malware
  21. BayBio, 2014 malware
  22. Viator (a subsidiary of TripAdvisor), 2014 hacked: 1.4 million users’ information stolen, including payment card data
  23. Yandy.com, 2014 cyberattack, over 40,000 records
  24. TheNaturalOnline.com. 2014, malware
  25. Wireless Emporium / Test Effects, LLC server malware
  26. California Department of Motor Vehicles 2014, online only
  27. Bring It To Me, LLC, 2014. Our online ordering software provider, BigTree Solutions, recently informed us that they identified unauthorized modifications in their software that could potentially allow new payment credit card information entered between October 14, 2013 and January 13, 2014 to have been obtained by an unauthorized user
  28. Smartphone Experts, 2013


  1. Darden 2018
  2. Chili’s (parent Brinker International), which has more than 1,600 locations worldwide, did not disclose which locations or how many diners might have been affected, but that it believes “the data incident was limited to between March – April 2018 for in-store purchases.”
  3. PDQ- May 19, 2017 – April 20, 2018 (breach time period)
  4. Landry’s Inc., a company that manages a nationwide stable of well-known restaurants — including Bubba Gump, Claim Jumper, McCormick & Schmick’s, Chart House, Rainforest Cafe and Morton’s. Announced December 2015; end to end encryption installed at 92% of locations (was in progress at time of breach, still under investigation)
  5. PF Chang’s, 2013-2014
  6. Chick-fil-A 2014
  7. Dairy Queen, 2014, about 400 locations. Backoff malware on point-of-sale.
  8. Jimmy John’s, 2014, 216 stores. point-of-sale systems made by Newtown, Pa.-based Signature Systems.
  9. Beef O’Brady’s 2014 hacked
  10. OTTO Pizzeria, 2014 malware, 900 customers
  11. Wendy’s- 2014, malware MI location only; Wendy’s 2016- still investigating, but may be limited in geographical scope


  • Taxi Affiliation Services /Dispatch Taxi

Data Breach List Resources (bookmark this page)

  • http://www.scmagazine.com
  • http://krebsonsecurity.com/
  • http://databreachtoday.com
  • http://www.bankinfosecurity.com
  • http://www.idtheftcenter.org/id-theft/data-breaches.html
  • http://www.esecurityplanet.com
  • https://www.privacyrights.org/data-breach