McDonald's staffer skimmed payment cards for Nintendo 3DS

By

Fraudsters bought iPads and laptops.

A McDonald's employee used a handheld skimming device for three weeks to collect some 282 payment card numbers.

McDonald's staffer skimmed payment cards for Nintendo 3DS
DeviantArt

The unidentified man told authorities he sold the card numbers to four men in exchange for $600 and a Nintendo 3DS, wkyc.com reported.

The McDonald's employee told authorities one of the men, Daniel Jefferson, would come to his apartment each night after work and download the card numbers from the skimmer.

Jefferson, Tetty-Mensah, Stanjulfran Mensah and Bismark Baah were jailed on charges they re-encoded other cards to buy iPads and laptop computers. 

Surveillance footage caught Tetty-Mensah making purchases at a WalMart store using the stolen cards.

"Nothing is more important to us than the security of our customers," McDonald's said in a statement.

"This is an isolated incident which we take very seriously, and this person is no longer employed by our organisation.”

The haul was much smaller than that from a branch of Subway where card data from 80,000 people was collected.

McDonald's was the victim of a data breach in December 2010 when a third party was hacked and customer information collected in connection with promotions was accessed.

This article originally appeared at scmagazineuk.com

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, UK edition
Tags:

Most Read Articles

Travel eSIMs secretly route traffic over Chinese and undisclosed networks: study

Travel eSIMs secretly route traffic over Chinese and undisclosed networks: study

Greater Western Water's billing system data issues laid bare

Greater Western Water's billing system data issues laid bare

Microsoft plans full quantum-resistant cryptography transition by 2033

Microsoft plans full quantum-resistant cryptography transition by 2033

Attackers weaponise Linux file names as malware vectors

Attackers weaponise Linux file names as malware vectors

Log In

  |  Forgot your password?