Hackers may have stolen your credit card data if you stayed at any of these hotels

Remember when news broke out that a certain retail or hotel chain was hit by a sophisticated malware attack that allowed hackers to steal personal information belonging to a large number of customers, including payment information? Well, this is such a case. And if you stayed at one of the 20 following hotels and paid for goods using your credit cards, then your financial data may be at risk, and you probably have to take various preemptive measures.

DON’T MISS: New photos and video show iPhone 7 Plus in the color we’ve all been waiting for: Space Black

20 hotels in the US operated by HEI Hotel & Resorts on behalf of Starwood, Marriott, Hyatt, and Intercontinental may have been included in the attack, ZDNet and Reuters report.

The number of affected customers is difficult to calculate because they used their cards multiple times. The malware was discovered in June of this year, but may have operated for periods longer than a year, being active from March 1st, 2015, in some systems.

The hackers likely targeted PoS terminals and recorded data in real time, given that the company says it does not store credit card numbers and data.

HEI said that hackers were able to steal names, payment card account numbers, card expiration dates, and verification codes. PIN codes were not collected.

The list of affected hotels, their addresses, and the period during which the malware operated on their PoS terminals is found in the following spreadsheet. In case you stayed at any of these 20 locations and used credit card transactions, you should review your banking statements for potentially fraudulent charges, and change your credit cards right away.

Trending right now:

  1. New photos and video show iPhone 7 Plus in the color we’ve all been waiting for: Space Black

  2. The ultimate Pokemon Go hack that lets you walk anywhere just got even better

  3. Yet another exciting new iPhone 7 feature may have just been uncovered

See the original version of this article on BGR.com