Wednesday, March 19, 2025
HomeSecurity NewsSodexo Filmology Under Cyber Attack - Customers Need to Cancel Their Credit...

Sodexo Filmology Under Cyber Attack – Customers Need to Cancel Their Credit Cards

Published on

SIEM as a Service

Follow Us on Google News

Cinema voucher-pusher Sodexo Filmology hit by a cyber attack that affected the customer’s Credit cards and many of the Sodexo customers being affected by this incident.

Cybercriminals targetted the system that hosted for Sodexo Filmology Cinema platform using the security flaws that presented within the system.

Attacker mainly focusing on the payment page and compromised many of the user’s accounts to steal the Credit Cards information over 2 months.

In this case, Sodexo released an official statement that says, “We would advise all employees who have used the site between 19th March-3rd April to cancel their payment cards and check their payment card statements”

Based on the affected Customer statement, this attack has been carried out for several months and he said “After speaking to Filmology to ask exactly what had happened, I was informed that my bank details were stolen from the payment page and that the incident has been reported to the ICO. The hack on the payment page was carried out over 2 months and involved many accounts.”

Attackers initiated 3 attempts on the victim’s credit card and later he aware of unauthorized access and he reported to the concerned bank, later they successfully blocked his credit card.

As of now this breach only affected customers in the UK and Ireland and they also said, company had previously been made aware of similar unlawful access to personal data on Sodexo Filmology platforms, and immediately notified the authorities, including law enforcement agencies, as well as affected customers.

Sodexo Filmology

Based on the company report, UK employee rewards via discounted cinema tickets has also taken its site down “for the foreseeable future” in order “to eliminate any further potential risk” to consumers and to protect consumers’ data.

These incidents have been caused by a targeted attack on the system we use to host our Cinema Benefits platform, despite having put in place a number of preventative measures with CREST-approved security specialists.”

“We sincerely apologize for any inconvenience this has caused you and are doing all that we can to provide access to your benefits via alternative means. We will share more information on this with you, or your provider, in the coming days, Sodexo Said.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

mySCADA myPRO RCE Vulnerabilities Expose ICS Devices to Remote Control

Supervisory Control and Data Acquisition (SCADA) systems play a pivotal role in managing critical...

Sante PACS Server Flaws Allow Remote Attackers to Download Arbitrary Files

Recently, several critical vulnerabilities were discovered in Sante PACS Server version 4.1.0, leaving it...

Attackers Hide Malicious Word Files Inside PDFs to Evade Detection

A newly identified cybersecurity threat involves attackers embedding malicious Word files within PDFs to...

US Sperm Donor Giant California Cryobank Hit by Data Breach

California Cryobank, a leading sperm donation facility based in Los Angeles, has been impacted...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

49,000+ Access Management Systems Worldwide Exposed to Major Security Gaps

A recent study conducted by Dutch IT security consultancy Modat has revealed alarming vulnerabilities...

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research...