DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Rosenthal Wine Shop discloses malware may have compromised customers’ payment card info

Posted on March 21, 2014 by Dissent

In response to a breach discovered on January 12, Rosenthal Wine Shop (Castle Creek Properties, Inc., dba Rosenthal the Malibu Estates) is notifying customers that malware may have compromised their payment card information:

We recently learned that unauthorized individuals or entities installed malicious software on computer systems used to process credit card transactions at the Rosenthal wine shop. The incident may have compromised payment card data of visitors that made payment card purchases at the wine shop tasting room including name, address, payment card account number, card expiration date and security code.

While we do not know whether a particular customer’s personal information has been or will be misused, as a precaution we are providing this notice to tell customers about the incident and call their attention to some steps they may take to help protect themselves.

We value our relationship with our customers and sincerely regret any inconvenience or concern this incident may cause. Keeping personal information secure is of the utmost importance to us, and we are taking active steps to help prevent this type of incident from reoccurring. On January 23, 2014, we contained the incident by installing an advanced malware protection and eradication system, and by reformatting the systems at issue.

We want to make customers aware of steps they can take to guard against identity theft or fraud. At this time, we recommend that customers review their credit and debit card account statements as soon as possible in order to determine if there are any discrepancies or unusual activity listed. Customers should continue to monitor their statements for unusual activity going forward. If they see anything they do not understand or that looks suspicious, or if they suspect that any fraudulent transactions have taken place, they should call the bank that issued their credit or debit card immediately.

In addition, to help protect our customers’ identities, we are offering a complimentary one-year membership of Experian’s® ProtectMyID® Alert. This product helps detect possible misuse of your personal information and provides you with identity protection services focused on immediate identification and resolution of identity theft. We recommend that customers carefully check their credit reports for accounts they did not open or for inquiries from creditors they did not initiate. They should also look for personal information in their credit reports, such as home address, that is not accurate. If they see anything they do not understand, they should call the credit agency immediately. If they find any suspicious activity on their credit reports, they should call their local police or sheriff’s office.

If customers affected by this incident wish to enroll for Experian’s® ProtectMyID® Alert services or have any questions or concerns, they may call us at (310)  899-8903. Again, we are sorry for any inconvenience or concern this event may cause customers.

SOURCE: California Attorney General’s website

Category: Business SectorMalware

Post navigation

← HealthPartners: Insurance client data was breached 2008-10
Update: Sutherland Healthcare Solutions breach affected over 220,000 patients, and counting (update1) →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide
  • Russian national and leader of Qakbot malware conspiracy indicted in long-running global ransomware scheme
  • Texas Doctor Who Falsely Diagnosed Patients as Part of Insurance Fraud Scheme Sentenced to 10 Years’ Imprisonment
  • VanHelsing ransomware builder leaked on hacking forum
  • Hack of Opexus Was at Root of Massive Federal Data Breach

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.