DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

TX: Houston Zoo also impacted by Services Systems Associates breach

Posted on July 9, 2015 by Dissent

The Houston Chronicle reports that the Houston Zoo’s gift shop customers may be impacted by a vendor’s breach that also affected customers at the Detroit Zoo’s gift shop:

Houston Zoo officials said on Thursday they discovered a “security breach” involving credit cards at their gift shops.

A zoo spokeswoman said the breach was contained to two gift shops at the zoo that are run by a third-party vendor, Services Systems Associates.

Read more on Chron.com.

SSA posted the following undated notice on their web site. It refers to “several” clients being affected. So far, we know of two.

Details on Service Systems Associates, Inc. Data Breach

We are sorry to report that Service Systems Associates, Inc. (SSA) was recently the victim of a data security breach.

The violation occurred in the point of sale systems located in the gift shops of several of our clients. This means that if a guest used a credit or debit card in the gift shop at one of our partner facilities between March 23 and June 25, 2015, the information on that card may have been compromised.

SSA takes this issue very seriously. As soon as we learned about the attack, SSA began working with law enforcement officials and a third-party forensic investigator, Sikich, to investigate the breach.

Though the investigation into this attack continues, the malware that caused the breach was identified and removed. All visitors should feel confident using credit or debit cards anywhere in these facilities. SSA is also taking several steps to improve its security and prevent future attacks.

SSA has notified the credit card companies of this situation. Guests who view any fraudulent activity on a credit or debit card should contact the relevant card issuer as soon as possible. Most credit card companies do not hold customers liable for fraudulent charges if they are promptly reported.

Additionally, here is some advice from the Consumer Financial Protection Bureau:

If you believe you are a victim of identity theft, you should contact one of the consumer reporting agencies listed below to place a fraud alert on your credit report. You only need to contact one of the three credit reporting companies to place an alert.

TransUnion: 1-800-680-7289; www.transunion.com; Fraud Victim Assistance Division, P.O. Box 6790, Fullerton, CA 92834-6790
Equifax: 1-800-525-6285; www.equifax.com; P.O. Box 740241, Atlanta, GA 30374-0241
Experian: 1-888-EXPERIAN (397-3742); www.experian.com; P.O. Box 9554, Allen, TX 75013

For more details on the steps to take if you are a victim of identity theft, visit the Federal Trade Commission’s Identity Theft website at http://www.ftc.gov/bcp/edu/microsites/idtheft.

We will provide relevant updates as soon as they may become available.

Again, we are very sorry for any inconvenience due to this situation.

Regards,

Timothy L. Brantley, CEO


Related:

  • Snowflake Loses Two More Bids to Dismiss Data Breach Plaintiffs
  • US company with access to biggest telecom firms uncovers breach by nation-state hackers
  • Alan Turing institute launches new mission to protect UK from cyber-attacks
  • Some lower-tier ransomware gangs have formed a new RaaS alliance -- or have they? (1)
  • US declines to join more than 70 countries in signing UN cybercrime treaty
  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
Category: MalwareMiscellaneousSubcontractorU.S.

Post navigation

← TX: ID theft suspect had more than 80 stolen items
Ex-clerk arrested in Worth County Magistrate Court information leak →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.