DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Kalahari Resorts in Wisconsin and Ohio hit by payment card breach

Posted on December 3, 2015 by Dissent

From their notice of December 1 (and no, this isn’t related to the Starwood properties’ breach disclosed recently):

Kalahari Resorts recently became aware of a possible security incident involving credit and debit card data reportedly used at our food & beverage, retail and spa outlets at our Wisconsin (1305 Kalahari Dr., Wisconsin Dells, WI 53965) and Ohio (7000 Kalahari Dr., Sandusky, OH 44870) sites. An investigation into this incident was immediately initiated. Our team, including third-party forensics experts, has been working continuously to understand the nature and scope of the incident. This investigation is ongoing. The incident has been contained and our customers can safely use payment cards at all Kalahari Resorts locations.

We believe that the intruder installed malicious software designed to capture data from certain credit and debit cards that were used at our resort outlets (such as restaurants, bars, retail and spa) between May 18, 2015 and November 9, 2015. The incident did not impact our hotel reservation or front desk systems, nor did it impact any transactions at our Pennsylvania resort. The incident could affect credit and debit card data, including card number, cardholder name, card’s expiration, and card verification code. However, we have not determined that any specific individual’s credit or debit card data was affected by this incident.

We take the privacy of personal information very seriously and deeply regret any inconvenience that this may cause our valued guests. We have been in contact with the U.S. Secret Service and will continue to fully cooperate with their investigation.

[…]

Click Here for Frequently Asked Questions

Kalahari did not disclose the number of affected consumers. They report learning of the problem in late October when they were “alerted” to the problem, but they do not indicate who alerted them and whether it was someone whose payment card information had been misused.


Related:

  • Clorox Files $380M Suit Alleging Cognizant Gave Hackers Passwords in Catastrophic 2023 Cyberattack
  • Cyberattacks Paralyze Major Russian Restaurant Chains
  • #StopRansomware: Interlock
  • Two more entities have folded after ransomware attacks
  • British institutions to be banned from paying ransoms to Russian hackers
  • Michigan ‘ATM jackpotting’: Florida men allegedly forced machines to dispense $107K
Category: Business SectorID TheftMalwareU.S.

Post navigation

← Computer company sues gaming establishment and its employees over alleged software theft
Anonymous claims to leak Paris climate officials’ data (UPDATED) →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Pakistan Petroleum thwarts ransomware attempt, says no critical data compromised
  • ShinyHunters sent Google an extortion demand; Shiny comments on current activities
  • Air France and KLM alert customers to data breach on external platform
  • Samourai CEO Keonne Rodriguez and Samourai CTO William Lonergan Hill Pled Guilty to Operating a Money Transmitting Business, Samourai Wallet, That Transmitted Over $200 Million in Criminal Proceeds
  • 6.4 million Bouygues Telecom just had their data exposed in a huge data breach – and it’s the second to hit French telecoms operators in a month
  • AU: Privacy watchdog sues Optus over mass data breach in 2022
  • Google reveals it became one of the Salesforce attack victims in June
  • Ohio law to require local governments to formally approve ransomware payments
  • 39-year-old Nigerian extradited to US from France over alleged hacking
  • Hamilton taxpayers on the hook for full $18.3M cyberattack repair bill after insurance claim denied

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Germany’s top court holds that police can only use spyware to investigate serious crimes
  • Flightradar24 receives reprimand for violating aircraft data privacy rights
  • Nebraska Attorney General Sues GM and OnStar Over Alleged Privacy Violations
  • Federal Court Allows Privacy Related Claims to Proceed in a Proposed Class Action Lawsuit Against Motorola
  • Italian Garante Adopts Statement on Health Data and AI
  • Trump administration is launching a new private health tracking system with Big Tech’s help
  • Attorney General James Takes Action to Protect Sensitive Personal Information of Tens of Millions of People

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.
Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report