{"id":313,"date":"2016-07-18T09:58:38","date_gmt":"2016-07-18T15:58:38","guid":{"rendered":"https:\/\/www.morphis-insights.com\/?p=313"},"modified":"2024-01-26T11:10:20","modified_gmt":"2024-01-26T11:10:20","slug":"card-stealing-malware-strikes","status":"publish","type":"post","link":"https:\/\/morphis-tech.com\/blog\/card-stealing-malware-strikes\/","title":{"rendered":"Card-stealing Malware Strikes Again"},"content":{"rendered":"<p>Unless you\u2019ve been living under a rock, you\u2019ve noticed the almost daily news stories focusing on hacked credit card information happening everywhere from toy stores to hotels. The latest in this sting of thefts has hit the Omni hotel chain. <a href=\"https:\/\/regmedia.co.uk\/2016\/07\/11\/omnibreachnotice.pdf\" target=\"_blank\" rel=\"noopener\">A spokesperson for Omni Hotels said<\/a> \u201can attacker managed to infiltrate its IT network and inject a software nasty into its payment terminals that siphoned off copies of people&#8217;s credit and debit cards.\u201d<\/p>\n<p>Regarding the hospitality industry specifically, recent examples of malware victims include <a href=\"http:\/\/www.theregister.co.uk\/2016\/04\/05\/trump_hotel_security_aced\/\" target=\"_blank\" rel=\"noopener\">Trump Hotels<\/a>, <a href=\"http:\/\/www.theregister.co.uk\/2015\/11\/20\/starwood_hotels_resorts_pwned\/\" target=\"_blank\" rel=\"noopener\">Starwood Resorts<\/a>, <a href=\"http:\/\/www.theregister.co.uk\/2015\/03\/06\/mandarin_oriental_breach_data_credit_card\/\" target=\"_blank\" rel=\"noopener\">Mandarin Oriental<\/a>, and <a href=\"http:\/\/www.csoonline.com\/article\/3089449\/security\/hard-rock-las-vegas-suffers-a-second-data-breach.html\" target=\"_blank\" rel=\"noopener\">The Hard Rock Casino<\/a>.<\/p>\n<p>So\u2026.are you shocked? My guess is no. It\u2019s also safe to assume this story will blow over soon in the wake of another, bigger, scarier hack. But where does this end? Patrons need to be able to stay at hotels, but they also need to feel safe both physically (on property) and financially (regarding digital fraud). What will be the straw that breaks the hoteliers\u2019 back when it comes to digital security?<\/p>\n<p>Outdated legacy IT systems are a common source of security breaches and modernizing these systems can appear daunting, yes. But is it as daunting as losing all customer credibility? Is it as daunting as being guilty of allowing theft, even if unintentionally, to the customers who patronize your business?<\/p>\n<p>And is it really that daunting? Actually, no. Companies like Morphis have developed world class technology platforms that take the strain out of the vast majority of the modernization work as evidenced on this blog by <a href=\"https:\/\/www.morphis-insights.com\/miami-dade-county-leading-way-legacy-modernization\/\" target=\"_blank\" rel=\"noopener\">Miami-Dade County<\/a> among many others.<\/p>\n<p>The process to identify which applications are candidates for modernization and then which is the best approach to modernization is laid out concisely in our White Paper <a href=\"https:\/\/www.morphis-insights.com\/breaking-the-shackles-lp\/\" target=\"_blank\" rel=\"noopener\">Breaking the Shackles of Legacy Systems<\/a>.<\/p>\n<p>Whatever your source legacy language, Morphis has an automated modernization route that will yield modernization in at least half the time and at half the cost of re-writing the application. Don\u2019t be daunted. Don\u2019t wait for disaster to strike. <a href=\"https:\/\/www.morphis-insights.com\/contact\/\" target=\"_blank\" rel=\"noopener\">Contact us<\/a> now and begin the process of securing your future.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Unless you\u2019ve been living under a rock, you\u2019ve noticed the almost daily news stories focusing on hacked credit card information happening everywhere from toy stores to hotels. The latest in this sting of thefts has hit the Omni hotel chain. A spokesperson for Omni Hotels said \u201can attacker managed to infiltrate its IT network and [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":312,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[82],"tags":[110,111],"class_list":["post-313","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-application-modernization","tag-security","tag-travel-hospitality"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Legacy Systems to Blame As Card-stealing Malware Strikes Again<\/title>\n<meta name=\"description\" content=\"Omni Hotels are just the latest. Outdated legacy IT systems are a common source of security breaches and modernizing these systems can appear daunting, yes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/morphis-tech.com\/blog\/card-stealing-malware-strikes\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Legacy Systems to Blame As Card-stealing Malware Strikes Again\" \/>\n<meta property=\"og:description\" content=\"Omni Hotels are just the latest. Outdated legacy IT systems are a common source of security breaches and modernizing these systems can appear daunting, yes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/morphis-tech.com\/blog\/card-stealing-malware-strikes\/\" \/>\n<meta property=\"og:site_name\" content=\"Morphis-Tech Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-07-18T15:58:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-26T11:10:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/07\/Keyloggers-used-by-Card-skimmers-to-steal-Credit-Cards-at-Nordstrom-Store.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bruno Andrade\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bruno Andrade\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/card-stealing-malware-strikes\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/card-stealing-malware-strikes\/\"},\"author\":{\"name\":\"Bruno Andrade\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/#\/schema\/person\/b6d9d149d3091b09f3ee9bd007183275\"},\"headline\":\"Card-stealing Malware Strikes Again\",\"datePublished\":\"2016-07-18T15:58:38+00:00\",\"dateModified\":\"2024-01-26T11:10:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/card-stealing-malware-strikes\/\"},\"wordCount\":351,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/card-stealing-malware-strikes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/07\/Keyloggers-used-by-Card-skimmers-to-steal-Credit-Cards-at-Nordstrom-Store.jpg\",\"keywords\":[\"Security\",\"Travel &amp; Hospitality\"],\"articleSection\":[\"Application Modernization\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/morphis-tech.com\/blog\/card-stealing-malware-strikes\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/card-stealing-malware-strikes\/\",\"url\":\"https:\/\/morphis-tech.com\/blog\/card-stealing-malware-strikes\/\",\"name\":\"Legacy Systems to Blame As Card-stealing Malware Strikes Again\",\"isPartOf\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/card-stealing-malware-strikes\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/card-stealing-malware-strikes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/07\/Keyloggers-used-by-Card-skimmers-to-steal-Credit-Cards-at-Nordstrom-Store.jpg\",\"datePublished\":\"2016-07-18T15:58:38+00:00\",\"dateModified\":\"2024-01-26T11:10:20+00:00\",\"description\":\"Omni Hotels are just the latest. Outdated legacy IT systems are a common source of security breaches and modernizing these systems can appear daunting, yes.\",\"breadcrumb\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/card-stealing-malware-strikes\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/morphis-tech.com\/blog\/card-stealing-malware-strikes\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/card-stealing-malware-strikes\/#primaryimage\",\"url\":\"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/07\/Keyloggers-used-by-Card-skimmers-to-steal-Credit-Cards-at-Nordstrom-Store.jpg\",\"contentUrl\":\"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/07\/Keyloggers-used-by-Card-skimmers-to-steal-Credit-Cards-at-Nordstrom-Store.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/card-stealing-malware-strikes\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/morphis-tech.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Card-stealing Malware Strikes Again\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/#website\",\"url\":\"https:\/\/morphis-tech.com\/blog\/\",\"name\":\"Legacy Modernization - Blog\",\"description\":\"Legacy to Cloud\",\"publisher\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/morphis-tech.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/#organization\",\"name\":\"Morphis Tech\",\"url\":\"https:\/\/morphis-tech.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2024\/06\/Logo_Blog_2024-1.svg\",\"contentUrl\":\"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2024\/06\/Logo_Blog_2024-1.svg\",\"width\":344,\"height\":51,\"caption\":\"Morphis Tech\"},\"image\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.instagram.com\/morphis_technologies\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/#\/schema\/person\/b6d9d149d3091b09f3ee9bd007183275\",\"name\":\"Bruno Andrade\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b26e477ef67cba42b8bc646722ca9ae122b8dc44bf6f5bf0c4072c2e36902b59?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b26e477ef67cba42b8bc646722ca9ae122b8dc44bf6f5bf0c4072c2e36902b59?s=96&d=mm&r=g\",\"caption\":\"Bruno Andrade\"},\"url\":\"https:\/\/morphis-tech.com\/blog\/author\/bruno-andrade\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Legacy Systems to Blame As Card-stealing Malware Strikes Again","description":"Omni Hotels are just the latest. Outdated legacy IT systems are a common source of security breaches and modernizing these systems can appear daunting, yes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/morphis-tech.com\/blog\/card-stealing-malware-strikes\/","og_locale":"en_GB","og_type":"article","og_title":"Legacy Systems to Blame As Card-stealing Malware Strikes Again","og_description":"Omni Hotels are just the latest. Outdated legacy IT systems are a common source of security breaches and modernizing these systems can appear daunting, yes.","og_url":"https:\/\/morphis-tech.com\/blog\/card-stealing-malware-strikes\/","og_site_name":"Morphis-Tech Blog","article_published_time":"2016-07-18T15:58:38+00:00","article_modified_time":"2024-01-26T11:10:20+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/07\/Keyloggers-used-by-Card-skimmers-to-steal-Credit-Cards-at-Nordstrom-Store.jpg","type":"image\/jpeg"}],"author":"Bruno Andrade","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bruno Andrade","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/morphis-tech.com\/blog\/card-stealing-malware-strikes\/#article","isPartOf":{"@id":"https:\/\/morphis-tech.com\/blog\/card-stealing-malware-strikes\/"},"author":{"name":"Bruno Andrade","@id":"https:\/\/morphis-tech.com\/blog\/#\/schema\/person\/b6d9d149d3091b09f3ee9bd007183275"},"headline":"Card-stealing Malware Strikes Again","datePublished":"2016-07-18T15:58:38+00:00","dateModified":"2024-01-26T11:10:20+00:00","mainEntityOfPage":{"@id":"https:\/\/morphis-tech.com\/blog\/card-stealing-malware-strikes\/"},"wordCount":351,"commentCount":0,"publisher":{"@id":"https:\/\/morphis-tech.com\/blog\/#organization"},"image":{"@id":"https:\/\/morphis-tech.com\/blog\/card-stealing-malware-strikes\/#primaryimage"},"thumbnailUrl":"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/07\/Keyloggers-used-by-Card-skimmers-to-steal-Credit-Cards-at-Nordstrom-Store.jpg","keywords":["Security","Travel &amp; Hospitality"],"articleSection":["Application Modernization"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/morphis-tech.com\/blog\/card-stealing-malware-strikes\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/morphis-tech.com\/blog\/card-stealing-malware-strikes\/","url":"https:\/\/morphis-tech.com\/blog\/card-stealing-malware-strikes\/","name":"Legacy Systems to Blame As Card-stealing Malware Strikes Again","isPartOf":{"@id":"https:\/\/morphis-tech.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/morphis-tech.com\/blog\/card-stealing-malware-strikes\/#primaryimage"},"image":{"@id":"https:\/\/morphis-tech.com\/blog\/card-stealing-malware-strikes\/#primaryimage"},"thumbnailUrl":"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/07\/Keyloggers-used-by-Card-skimmers-to-steal-Credit-Cards-at-Nordstrom-Store.jpg","datePublished":"2016-07-18T15:58:38+00:00","dateModified":"2024-01-26T11:10:20+00:00","description":"Omni Hotels are just the latest. Outdated legacy IT systems are a common source of security breaches and modernizing these systems can appear daunting, yes.","breadcrumb":{"@id":"https:\/\/morphis-tech.com\/blog\/card-stealing-malware-strikes\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/morphis-tech.com\/blog\/card-stealing-malware-strikes\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/morphis-tech.com\/blog\/card-stealing-malware-strikes\/#primaryimage","url":"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/07\/Keyloggers-used-by-Card-skimmers-to-steal-Credit-Cards-at-Nordstrom-Store.jpg","contentUrl":"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/07\/Keyloggers-used-by-Card-skimmers-to-steal-Credit-Cards-at-Nordstrom-Store.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/morphis-tech.com\/blog\/card-stealing-malware-strikes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/morphis-tech.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Card-stealing Malware Strikes Again"}]},{"@type":"WebSite","@id":"https:\/\/morphis-tech.com\/blog\/#website","url":"https:\/\/morphis-tech.com\/blog\/","name":"Legacy Modernization - Blog","description":"Legacy to Cloud","publisher":{"@id":"https:\/\/morphis-tech.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/morphis-tech.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/morphis-tech.com\/blog\/#organization","name":"Morphis Tech","url":"https:\/\/morphis-tech.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/morphis-tech.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2024\/06\/Logo_Blog_2024-1.svg","contentUrl":"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2024\/06\/Logo_Blog_2024-1.svg","width":344,"height":51,"caption":"Morphis Tech"},"image":{"@id":"https:\/\/morphis-tech.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.instagram.com\/morphis_technologies\/"]},{"@type":"Person","@id":"https:\/\/morphis-tech.com\/blog\/#\/schema\/person\/b6d9d149d3091b09f3ee9bd007183275","name":"Bruno Andrade","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/morphis-tech.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b26e477ef67cba42b8bc646722ca9ae122b8dc44bf6f5bf0c4072c2e36902b59?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b26e477ef67cba42b8bc646722ca9ae122b8dc44bf6f5bf0c4072c2e36902b59?s=96&d=mm&r=g","caption":"Bruno Andrade"},"url":"https:\/\/morphis-tech.com\/blog\/author\/bruno-andrade\/"}]}},"_links":{"self":[{"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/posts\/313","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/comments?post=313"}],"version-history":[{"count":1,"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/posts\/313\/revisions"}],"predecessor-version":[{"id":6944,"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/posts\/313\/revisions\/6944"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/media\/312"}],"wp:attachment":[{"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/media?parent=313"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/categories?post=313"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/tags?post=313"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}