{"id":75998,"date":"2015-03-19T22:08:37","date_gmt":"2015-03-20T02:08:37","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2021-07-20T11:56:41","modified_gmt":"2021-07-20T15:56:41","slug":"zoup-pos-breached","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/zoup-pos-breached\/","title":{"rendered":"ZOUP! POS Breached"},"content":{"rendered":"<p><a href=\"https:\/\/web.archive.org\/web\/20150916000940\/http:\/\/blog.monitor.us\/2014\/09\/hacked-again-retailers-need-to-improve-pos-security\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-98528 \" title=\"ZOUP! POS Breached\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/pos-hacked.jpg?resize=133%2C100&#038;ssl=1\" alt=\"ZOUP! POS Breached\" width=\"133\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/pos-hacked.jpg?resize=150%2C113&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/pos-hacked.jpg?resize=75%2C56&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/pos-hacked.jpg?w=260&amp;ssl=1 260w\" sizes=\"auto, (max-width: 133px) 100vw, 133px\" \/><\/a>Another day, another <a title=\"Data breach\" href=\"http:\/\/en.wikipedia.org\/wiki\/Data_breach\" target=\"_blank\" rel=\"wikipedia nofollow noopener noreferrer\">data breach<\/a>.<strong> Zoup!<\/strong> the restaurant known for its soup, salad, and sandwiches is the latest retailer to have it POS system hacked. The hack exposed credit card information <strong>hacked<\/strong> <a title=\"16 Michigan Zoup! locations may have been caught up in hack, third party vendor blamed\" href=\"http:\/\/www.mlive.com\/lansing-news\/index.ssf\/2015\/03\/16_michigan_zoup_locations_may.html#incart_more_business\" target=\"_blank\" rel=\"noopener noreferrer\">according<\/a> to <a title=\"MLive\" href=\"http:\/\/www.mlive.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>MLive<\/em><\/a>. From a statement posted on the <a title=\"Zoup\" href=\"https:\/\/web.archive.org\/web\/20211029235535\/https:\/\/www.zoup.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Zoup!<\/a> website Zoup! CEO Eric Ersher <a title=\"Zoup! Customer Security\" href=\"https:\/\/web.archive.org\/web\/20160612190122\/http:\/\/www.zoup.com:80\/customersecurity.html\" target=\"_blank\" rel=\"noopener noreferrer\">told<\/a> their customers victims \u2013 too bad so sad, \u201c<em>\u2026 in the days ahead, we will work hard to preserve your trust.<\/em>\u201d<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20211029235535\/https:\/\/www.zoup.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98531 \" title=\"ZOUP! \" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Zoup_logo.png?resize=107%2C90&#038;ssl=1\" alt=\"ZOUP! \" width=\"107\" height=\"90\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Zoup_logo.png?resize=150%2C126&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Zoup_logo.png?resize=75%2C63&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Zoup_logo.png?w=176&amp;ssl=1 176w\" sizes=\"auto, (max-width: 107px) 100vw, 107px\" \/><\/a>Apparently re-gaining my trust does not include telling me my <strong>information was stolen<\/strong>, or the usual <strong>credit monitoring<\/strong> or <strong>credit restoration services<\/strong>, according to <em>MLive<\/em> <a title=\"Southfield, MI\" href=\"https:\/\/www.google.com\/maps\/place\/28290+Franklin+Rd,+Southfield,+MI+48034\/@42.4881039,-83.3010553,1028a,20y,41.4t\/data=!3m1!1e3!4m2!3m1!1s0x8824b772430e43f3:0x648e75d346441b20\" target=\"_blank\" rel=\"noopener noreferrer\">Southfield, MI<\/a>-based Zoup! will not be contacting customers who were affected by the cyber-attack.<\/p>\n<p>The stonewall goes beyond Zoup!&#8217;s customers. When contacted by security researcher <a title=\"Brain Krebs\" href=\"http:\/\/krebsonsecurity.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Brian Krebs<\/a>, for comment CEO Ersher referred calls to <a title=\"NEXTEP\" href=\"https:\/\/web.archive.org\/web\/20160316064250\/http:\/\/www.nextepsystems.com:80\/About-us\/News\" target=\"_blank\" rel=\"noopener noreferrer\">NEXTEP<\/a>, who runs all of Zoup!s <strong>point-of-sale devices<\/strong>. <a title=\"Troy, MI\" href=\"https:\/\/www.google.com\/maps\/place\/NEXTEP+SYSTEMS\/@42.5601422,-83.1927753,1187m\/data=!3m1!1e3!4m2!3m1!1s0x0:0x632abcb1a179946d\" target=\"_blank\" rel=\"noopener noreferrer\">Troy, MI<\/a>-based NEXTEP President Tommy Woycik emailed Mr. Krebs a <a title=\"Point-of-Sale Vendor NEXTEP Probes Breach\" href=\"http:\/\/krebsonsecurity.com\/2015\/03\/point-of-sale-vendor-nextep-probes-breach\/\" target=\"_blank\" rel=\"noopener noreferrer\">statement<\/a>, which says in part, \u201c<em>NEXTEP was recently <strong>notified by law enforcement<\/strong> that the security of the systems at some of our customer locations may have been compromised.<\/em>\u201d<\/p>\n<p><a href=\"http:\/\/www.clearswift.com\/blog\/2014\/09\/22\/the-australian-federal-police-department-in-sensitive-data-leak-scandal\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98533 \" title=\"Data leak\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data-leak-1-e1564255272882-150x98.png?resize=138%2C90&#038;ssl=1\" alt=\"\" width=\"138\" height=\"90\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data-leak-1-e1564255272882.png?resize=150%2C98&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data-leak-1-e1564255272882.png?resize=75%2C49&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data-leak-1-e1564255272882.png?w=291&amp;ssl=1 291w\" sizes=\"auto, (max-width: 138px) 100vw, 138px\" \/><\/a>The <em>MLive<\/em> article reports that Zoup! learned March 4 of a payment card security issue that <strong>affected most of its U.S. locations. Between Feb. 2 and March 5,<\/strong> the malware installed on the point-of-sale system was <strong>tracking credit card numbers<\/strong>, and possibly <strong>PII<\/strong> data such as the cardholders&#8217; name, card expiration date, and verification code.<\/p>\n<p><a title=\"Point of sale\" href=\"http:\/\/en.wikipedia.org\/wiki\/Point_of_sale\" target=\"_blank\" rel=\"wikipedia nofollow noopener noreferrer\">POS<\/a> vendors have a notorious track record for <a title=\"Data security\" href=\"http:\/\/en.wikipedia.org\/wiki\/Data_security\" target=\"_blank\" rel=\"wikipedia nofollow noopener noreferrer\">data security<\/a>. One breach can impact 100&#8217;s of locations. The 2014 breach at the POS vendor <a title=\"Signature Systems Breach Expands\" href=\"http:\/\/krebsonsecurity.com\/2014\/09\/signature-systems-breach-expands\/\" target=\"_blank\" rel=\"noopener noreferrer\">Signature Systems Inc<\/a>. affected <a title=\"Jimmy John data breach\" href=\"https:\/\/www.jimmyjohns.com\/datasecurityincident\/\" target=\"_blank\" rel=\"noopener noreferrer\">Jimmy John sandwich shops<\/a> and at least 100 other restaurants. The 2015 breach at <a title=\"Card fraud blamed on cyber attack on 8 local businesses\" href=\"https:\/\/web.archive.org\/web\/20160926061546\/http:\/\/www.steamboattoday.com\/news\/2015\/jan\/16\/card-fraud-blamed-cyber-attack-8-local-businesses\/\" target=\"_blank\" rel=\"noopener noreferrer\">Advanced Restaurant Management Applications<\/a><span class=\"apple-converted-space\">\u00a0<\/span>(ARMA)<span class=\"apple-converted-space\"> affected many of its client restaurants. And now Nextep has impact up to 75 Zoup! locations and possibly 100,000&#8217;s of customers.<br \/>\n<\/span><\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20150428115508\/http:\/\/rogerrenwick.hubpages.com\/hub\/Things-That-Make-You-Say-Ouch\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98535 \" title=\"What does this do?\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/boys-will-be-boys-1.jpg?resize=115%2C99&#038;ssl=1\" alt=\"What does this do?\" width=\"115\" height=\"99\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/boys-will-be-boys-1.jpg?resize=150%2C129&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/boys-will-be-boys-1.jpg?resize=75%2C65&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/boys-will-be-boys-1.jpg?w=620&amp;ssl=1 620w\" sizes=\"auto, (max-width: 115px) 100vw, 115px\" \/><\/a>CEO Ersher stated in a statement in a statement, &#8220;<em>&#8230; we moved as swiftly as possible to address the problem once we learned about it &#8230;<\/em> &#8221; Oh really? if they had read <a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Bach Seat<\/em><\/a> last year when I <a title=\"Remote Desktop Opens Door to POS Malware\" href=\"https:\/\/wp.me\/p2wgaW-iyk\" target=\"_blank\" rel=\"noopener noreferrer\">wrote<\/a> about POS hacks or paid attention to <a title=\"Backoff Point-of-Sale Malware\" href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/TA14-212A\" target=\"_blank\" rel=\"noopener noreferrer\">US-CERT<\/a> or warnings they would have been prepared.<\/p>\n<p>The company set up a <a title=\"Zoup! Customer Security\" href=\"https:\/\/web.archive.org\/web\/20160612190122\/http:\/\/www.zoup.com:80\/customersecurity.html\" target=\"_blank\" rel=\"noopener noreferrer\">website<\/a> for customers with concerns or call Zoup! at 800-343-9308, Monday &#8211; Friday, 8 a.m. &#8211; 5 p.m. ET.<\/p>\n<p><em><strong>rb-<\/strong><\/em><\/p>\n<p><em>I think that Zoup! should cool the attitude and review the info I posted in 2014 on how to avoid POS System breaches.<\/em><\/p>\n<p style=\"padding-left: 30px;\"><em><strong>1.\u00a0 Change administrative passwords on all POS systems.<\/strong> (Hackers are scanning the Internet for easily guessable passwords).<\/em><\/p>\n<p style=\"padding-left: 30px;\"><em><strong>2.\u00a0 Implement a firewall or access control list on remote access \/administration services.<\/strong> (If hackers can\u2019t reach your systems, they can\u2019t easily steal from it).<\/em><\/p>\n<p style=\"padding-left: 30px;\"><em><strong>3.\u00a0 Avoid using POS systems to browse the web<\/strong> (or anything else on the Internet).<\/em><\/p>\n<p style=\"padding-left: 30px;\"><em><strong>4.\u00a0 Make sure your POS is a <a title=\"What is PCI DDS?\" href=\"https:\/\/web.archive.org\/web\/20200501132614\/https:\/\/searchfinancialsecurity.techtarget.com\/definition\/PCI-DSS-Payment-Card-Industry-Data-Security-Standard\" target=\"_blank\" rel=\"noopener noreferrer\">PCI DSS compliant<\/a> application<\/strong> (ask your vendor) <\/em><\/p>\n<p style=\"padding-left: 30px;\"><em><strong>5.\u00a0 Use password management software like <a title=\"LastPass Password Management\" href=\"https:\/\/lastpass.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">LastPass<\/a> to generate secure passwords. <\/strong>(<\/em><em>LastPass<\/em> allows you to avoid storing passwords in your browsers and can generate ready-to-use secure passwords for you).<\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/web.archive.org\/web\/20201130164919\/https:\/\/www.geekwire.com\/2015\/microsoft-takes-cafeteria-payment-kiosks-offline-as-vendor-deals-with-breach\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Microsoft takes cafeteria payment kiosks offline as vendor deals with breach<\/a> (geekwire.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Michigan-based eatery Zoup! POS system by Nextep breached releasing customer credit card and PII info<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3277,761,2442,125,19,951,2206,4,2393],"class_list":["post-75998","post","type-post","status-publish","format-standard","hentry","category-security","tag-3277","tag-brian-krebs","tag-credit-card","tag-data-breach","tag-michigan","tag-pii","tag-pos","tag-security","tag-zoup"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/75998","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=75998"}],"version-history":[{"count":14,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/75998\/revisions"}],"predecessor-version":[{"id":128124,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/75998\/revisions\/128124"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=75998"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=75998"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=75998"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}