recommended reading


South African banks roiled by hacked KFC credit card terminals

Credential-stealing malware; Payment device infection

Sales devices corrupted by malicious software at fast food outlets have cost financial institutions tens of millions of rand, resulting in one of the country’s worst breaches of customer card data.

KFC was particularly hard hit by the malware, called Dexter. The breach affected most of South Africa’s card-issuing banks.

The infection came from overseas, possibly involving a crime syndicate based somewhere in Europe, Payments Association of South Africa CEO Walter Volker said. The South African Police Service, Interpol and Europol are all involved in an investigation to bring the syndicate or syndicates responsible to justice.

Banks noticed unusual levels of suspected fraud at certain fast-food restaurants earlier this year.

“It took quite a while to get to the bottom of [this incident], because it was not the standard Dexter malware, which has been around for a while, and which many antivirus software programs can pick up,” Volker said. “This one was a variant that was changed to [avoid detection] by the antivirus software.”

When account holders presented their cards to be swiped, malware hidden in the infected terminals read the card numbers and sent this information to a syndicate.

Card numbers filched by the Dexter variant already have been used to make in-store purchases in the United States. “This has led to arrests,” Tech Central reports.

The hackers did not copy the “card verification value” security numbers on the backs of the cards, so criminals are not able to use the cards to shop online.

Volker assured that “all the fast-food retailers have been cleaned out as far as possible...We’re still looking at some sites that are questionable, but they are a very small minority. I don’t think there’s any need for panic or concern at this stage and certainly no one will be out of pocket [as the banks will honor losses].”

He added that it’s “very difficult” to estimate how many cards have been compromised, but it’s “certainly not in the millions.”

ThreatWatch is a regularly updated catalog of data breaches successfully striking every sector of the globe, as reported by journalists, researchers and the victims themselves.


Financial Services; Food and Beverage


October 15, 2013

reported by

Tech Central

number affected


location of breach

South Africa



location of perpetrators


date breach occurred


date breach detected


Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.


When you download a report, your information may be shared with the underwriters of that document.