DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

CT: Alerted that banks had discovered a problem, Swiss Cleaners investigates and notifies customers of payment card breach that began in 2014

Posted on November 16, 2015 by Dissent

Swiss Cleaners values the relationship it has with its customers and understands the importance of protecting payment card information.  Swiss Cleaners was recently notified that banks had identified a pattern of unauthorized charges on payment cards after those cards were used in Swiss Cleaners stores.  Swiss Cleaners immediately began to investigate and engaged a leading computer security firm to examine its payment system.

Based on the investigation, Swiss Cleaners believes that an unauthorized person was able to install a program on a server in its payment card system that was designed to make a copy of payment card data as it was being routed through Swiss Cleaners’ system to the payment processor.  The program searched for data found in the magnetic stripe on payment cards, which includes the cardholder name, card number, expiration date, and a verification code.  The investigation determined that this incident potentially affected payment cards used at the Swiss Cleaners store located at 35 Windsor Ave, PO Box 825, Vernon, CT 06066 during the period from December 30, 2014 through October 26, 2015, as well as any of Swiss Cleaners’ other stores during the period from December 30, 2014 through October 23, 2015.  The Company’s Swiss Uniform Services were not affected by this incident.

Swiss Cleaners wanted to let its customers know about this incident as soon as it could.  If a customer used a payment card at any of our locations during these time frames, we recommend that they regularly review their payment card statements for unauthorized activity.  Customers should immediately report any unauthorized charges to their financial institution because the major credit card companies have rules that restrict them from requiring cardholders to pay for fraudulent charges that are reported in a timely manner.

To help prevent this from happening again, the Company has been working with the computer security firm to review its security measures, ensure that this issue has been fully remediated, and look for ways to enhance its security measures.  Swiss Cleaners is also working with the credit card companies and processors to provide them with its findings so that the banks that issued cards that may be affected by this incident can be alerted.  When banks receive those alerts, they can conduct heightened monitoring to prevent unauthorized charges.

Swiss Cleaners regrets any inconvenience or concern this may have caused.  If you have questions, please visit www.swisscleaners.com or call (888) 760-4869, Monday – Friday from 9 am – 9 pm EST.

About Swiss Cleaners: Swiss Cleaners is a family owned and operated dry cleaning and laundry business with more than 100 years in the dry cleaning industry.  The Company has eight locations in central Connecticut.

SOURCE Swiss Cleaners


Related:

  • Two years after an audit highlighted significant concerns, North Salem Central School District leaves sensitive student data at risk
  • University of Pennsylvania says it wasn't hacked after a vulgar email was sent to campus community
  • Veradigm's Breach Claims Under Scrutiny After Dark Web Leak
  • Russian Police Bust Suspected Meduza Infostealer Developers
  • Ukrainian Conti Ransomware Suspect Extradited to US from Ireland
  • Snowflake Loses Two More Bids to Dismiss Data Breach Plaintiffs
Category: Business SectorMalwareU.S.

Post navigation

← Fashion to Figure notifying customers of payment card compromise
Australian member of #Anonymous sentenced to jail →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Once a Patient’s in Custody, ICE Can Be at Hospital Bedsides — But Detainees Have Rights
  • OpenAI fights order to turn over millions of ChatGPT conversations
  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.