DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Dairy Queen update: almost 400 locations affected by Backoff malware

Posted on October 10, 2014 by Dissent

The Dairy Queen breach, first reported in August, is back in the news this week as more details emerged. In a statement issued yesterday, they write (emphasis added by me):

International Dairy Queen, Inc. recently learned of a possible malware intrusion that may have affected some payment cards at certain DQ® locations and one Orange Julius® location in the U.S.  Upon learning of the issue, we launched an extensive investigation and retained external forensic experts to help determine the facts.  Because nearly all DQ and Orange Julius locations are independently owned and operated, we worked closely with affected franchise owners, as well as law enforcement authorities and the payment card brands, to assess the nature and scope of the issue.  As a result of our investigation, we discovered evidence that the systems of some DQ locations and one Orange Julius location were infected with the widely-reported Backoff malware that is targeting retailers across the country.  The investigation revealed that a third-party vendor’s compromised account credentials were used to access systems at those locations.

Based on the investigation, we have established the following:

  • The Backoff malware was present on systems at a small percentage of locations in the U.S.
  • The time periods during which the Backoff malware was present on the affected systems vary by location.  A list of impacted DQ locations and the one Orange Julius location, as well as the relevant time periods, is available here.
  • The affected systems contained customers’ names, payment card numbers and expiration dates.  We have no evidence that other customer personal information, such as Social Security numbers, PINs or email addresses, were compromised as a result of this malware infection.
  • Based on our investigation, we are confident that this malware has been contained.

We deeply regret any inconvenience this incident may cause.  Our customers are our top priority and we are committed to working with our franchise owners to address the issue.

We are notifying DQ and Orange Julius customers about this incident so they can take steps to help protect their information.  You are entitled under U.S. law to one free credit report annually from each of the three nationwide consumer reporting agencies.  We encourage you to remain vigilant by reviewing your account statements and monitoring your free credit reports.  If you believe your payment card may have been affected, contact your bank or payment card issuer immediately.  Additional information and security tips are available here.

We are offering free identity repair services for one year to customers in the U.S. who used their payment card at one of the impacted locations during the relevant time period.  Information on these services and eligibility can be found here.

If you have any questions about this issue, please call us toll–free at 1-855-865-4456, Monday through Saturday from 8 a.m. CT to 8 p.m. CT.

We sincerely apologize for any inconvenience this may have caused you.

 

No related posts.

Category: Business SectorMalwareOf Note

Post navigation

← Laptops stolen from Albertina Kerr's Gresham campus contained information on 1,300 psychiatric patients
In stalled FTC case, LabMD seeks immunity for former Tiversa employee to testify →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Chinese hackers suspected in breach of powerful DC law firm
  • Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities
  • CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
  • McDonald’s McHire leak involving ‘123456’ admin password exposes 64 million applicant chat records
  • Qilin claims attack on Accu Reference Medical Laboratory. It wasn’t the lab’s first data breach.
  • Louis Vuitton hit by data breach in Türkiye, over 140,000 users exposed; UK customers also affected (1)
  • Infosys McCamish Systems Enters Consent Order with Vermont DFR Over Cyber Incident
  • Obligations under Canada’s data breach notification law
  • German court offers EUR 5000 compensation for data breaches caused by Meta
  • Air Force Employee Pleads Guilty to Conspiracy to Disclose Unlawfully Classified National Defense Information

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • DeleteMyInfo Wins 2025 Digital Privacy Excellence Award from Internet Safety Council
  • TikTok Loses First Appeal Against £12.7M ICO Fine, Faces Second Investigation by DPC
  • German court offers EUR 5000 compensation for data breaches caused by Meta
  • How to Build on Washington’s “My Health, My Data” Act
  • Department of Justice Subpoenas Doctors and Clinics Involved in Performing Transgender Medical Procedures on Children
  • Google Settles Privacy Class Action Over Period Tracking App
  • ICE Is Searching a Massive Insurance and Medical Bill Database to Find Deportation Targets

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.