Checkers and Rally’s Data Breach
Recently, Checkers Drive-In Restaurants has disclosed a data breach which affected many of its customers throughout its 102 Checkers and Rally’s locations across the country. The restaurant chain has admitted defeat, apologized, and has also engaged numerous data security experts and to help investigate the incident. The Checkers data breach occurred due to a data security issue involving malware at certain Checkers and Rally’s locations, the company said. In addition, Checkers has collaborated with third-party security experts to contain and remove the malware.
Evidently, there was malware installed on Checkers & Rally’s point-of-sale (POS) systems at certain restaurant locations. The malware then gave an unauthorized party easy access to obtain credit and debit card data from Checkers and Rally’s customers.
Checkers has released a list of affected restaurants, along with estimated dates of exposure. It also is working with federal law enforcement authorities and payment card companies to protect payment card data from Checkers and Rally’s customers who may have been affected by the incident.
Have You Been Affected?
If you believe to have had your data compromised by the Checkers and Rally’s Data Breach, please note that Levi & Korsinsky, LLP is currently investigating the incident. If you have made a purchase at any of the affected locations and wish to discuss your legal rights, please contact the folks at Levi & Korsinsky today!
Editor’s note on the Checkers Data Breach:
This piece is written about the recent Checkers and Rally’s Data Breach. For more information, please shoot us an email to Outreach@ConsiderTheConsumer.com, find us on Twitter, Facebook, Instagram, LinkedIn, or even connect with us directly on our website! We look forward to hearing from all of you. Please note that this investigation piece has been sponsored by Levi & Korsinsky, LLP and Consider The Consumer has received compensation for such sponsorship.
Interested in articles like these? Become a subscriber below!