• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.702 ■ Fall 2020 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

Ritz London suspects data breach, fraudsters pose as staff in credit card data scam

December 1, 2020 by Chidiebele Okosi Leave a Comment

What will be interesting is to actually discover how the scammers got access to the information of Ritz guest,  the article does not disclose yet as investigations are still ongoing but it is quite interesting to know the outcome and how such personal information was obtained.

Scammers phoned guests to “confirm” their credit card details for reservations.

In a series of messages posted to Twitter dated August 15, the luxury hotel chain said that on August 12, the company was made aware of a “potential data breach within our food and beverage reservation system.”

The scammers phoned Ritz restaurant reservation holders with the “exact” details of their bookings, while requesting the confirmation of their payment card details.

The fraudsters, pretending to be Ritz employees, used call ID spoofing to appear to be from the hotel.

“We immediately launched an investigation to identify the cause of the breach, which is ongoing, to find out what happened, how and to prevent this from happening again,” the hotel chain says.

The UK’s Information Commissioner’s Office (ICO) has been informed of the security incident.

https://www.zdnet.com/article/ritz-london-struck-by-data-breach-fraudsters-pose-as-staff-in-credit-card-data-scam/

Filed Under: Week 02: TCP/IP and Network Architecture Tagged With:

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (46)
  • Week 01: Overview (3)
  • Week 02: TCP/IP and Network Architecture (6)
  • Week 03: Reconnaisance (5)
  • Week 04: Network Mapping and Vulnerability Scanning (11)
  • Week 05: Metasploit (10)
  • Week 06: More Metasploit (4)
  • Week 07: Social Engineering (7)
  • Week 08: Malware (6)
  • Week 09: Web Application Hacking (7)
  • Week 10: SecuritySheperd (6)
  • Week 11: Intro to Dark Web and Intro to Cloud (4)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (7)
  • Week 13: WPA2 Enterprise and Beyond WiFi (3)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (4)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in