Skip navigation
restaurant-point-of-sale-NCR-Aloha-ransomware-attack.gif Moyo Studio/iStock/Getty Images Plus
NCR, in a statement Monday, said that “while in-restaurant purchases and transactions continue to operate, affected customers have reduced capabilities on specific Aloha cloud-based and Counterpoint functionality that has impacted their ability to manage restaurant administrative functions.”

Restaurants continue to deal with NCR-Aloha ransomware attack

Operators say cyber incident filters into staff scheduling, inventory and credit-card processing

Restaurant operators continued to deal midweek with an NCR Corp. cyber ransomware incident that impacted functions of the company’s Aloha cloud-based point-of-sale and Counterpoint functions.

Atlanta-based NCR Corp., which specializes in systems for the restaurant industry, on Monday said that on April 13 it “determined that a single data center outage that is impacting some functionality for a subset of its commerce customers was caused by a cyber ransomware incident.”

A restaurant operator in the Midwest said Tuesday that the incident continued to affect offline credit card processing, scheduling software and communications with inventory software.

In a press release on Monday, the company said: “While in-restaurant purchases and transactions continue to operate, affected customers have reduced capabilities on specific Aloha cloud-based and Counterpoint functionality that has impacted their ability to manage restaurant administrative functions.

“NCR is conducting concurrent efforts to establish alternative functionality for customers, fully restore impacted data and applications and to enhance its cyber security protections,” the company said.

NCR said upon discovering the ransomware attack, it “started contacting customers, enacted its cybersecurity protocol and engaged outside experts to contain the incident and begin the recovery process.”

The company said the investigation into the incident includes NCR experts, external forensic cybersecurity experts and federal law enforcement.

“At this time, our ongoing investigation also indicates that no customer systems or networks are involved,” the company said Monday. “None of our ATM, digital banking, payments, or other retail products are processed at this data center.”

NCR did not provide details about a ransom demand.

Contact Ron Ruggless at [email protected]

Follow him on Twitter: @RonRuggless

TAGS: Operations
Hide comments

Comments

  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
Publish