“IMWAN for all seasons.”



Post new topic Reply to topic  [ 11 posts ] 
Author Message
 Post subject: "Target data breach part of broader organized attack"
PostPosted: Fri Jan 17, 2014 11:04 pm 
User avatar
I love Music & hate brickwalled audio

Joined: 27 Sep 2006
Posts: 37646
Location: The Pasture
ZD Net wrote:

Target data breach part of broader organized attack

Summary: A confidential U.S. government report indicates that the Target data breaches were tied to a broader effort against retailers. New malicious software called KAPTOXA led the attacks.

Target is taking the financial and reputation hit for its customer data breach, but is reportedly part of a much broader cybercrime campaign that apparently runs through the former Soviet Union.

The Wall Street Journal, citing a confidential U.S. government report, reported that the hackers that went after Target spoke in Russian and the attacks were part of a broader effort. Target first reported that 40 million credit and debit card accounts had been compromised. In a follow-up, Target said that 70 million people may have had their personal data compromised.

Given the attacks landed in the peak holiday shopping season, Target took a financial hit and expects that it will face more costs.

More: Cisco's annual security report offers grim outlook for 2014 | Likely candidate for Target breach malware found | Target CEO promises cybersecurity education of the masses | Cisco on major retail hacks: Point-of-sale hardware is the problem | More retailers hit by security breaches; malware found on Target's POS machines | Target's data breach: It gets worse

The U.S. government report, written with the help of iSight Partners, outlined the following:

The attack may have ties to organized crime in the former Soviet Union.
Target's credit card readers had been on the black market since the Spring and were partly written in Russian.
Malware used in the attack couldn't be detected by antivirus software.

The U.S. Department of Homeland Security sent its findings to financial services and retail companies. In a blog post, iSight outlined the following but didn't release too much information.

iSight Partners, working with the U.S. Secret Service, has determined that a new piece of malicious software, KAPTOXA (Kar-Toe-Sha), has potentially infected a large number of retail information systems. A joint publication has been issued by the Department of Homeland Security, USSS, FS-ISAC and iSIGHT Partners.

Nieman Marcus is the only other retailer to note that its shopper data was compromised during the holiday.

If the iSight and Department of Homeland Security report is correct other retailers are likely to come clean about attacks and compromised customer data. In other words, you can expect a lot more apologies like Target's.

Image

_________________
Putty Cats are God's gift to the universe.


Last edited by Geff R. on Fri Jan 17, 2014 11:34 pm, edited 1 time in total.

Top
  Profile  
 
 Post subject: "Target data breach part of broader organized attack"
PostPosted: Fri Jan 17, 2014 11:08 pm 
User avatar
I love Music & hate brickwalled audio

Joined: 27 Sep 2006
Posts: 37646
Location: The Pasture
Sans wrote:
--Target Point-of-Sale (POS) Malware
(January 15 & 16, 2014)
More details are emerging about the malware used to steal data from
payment cards used at Target over an 18-day period late last year.
According to sources familiar with the ongoing investigation, the attack
used memory-scraping malware in Target's point-of-sale systems. The
malware "parses data stored briefly in the memory banks of specific POS
devices" and can capture magnetic stripe data. The attackers appear to
have used a central server in Target to store stolen data and then
transmitted the data to an external FTP server.
http://krebsonsecurity.com/2014/01/a-fi ... n-malware/
http://krebsonsecurity.com/2014/01/a-cl ... e-part-ii/

_________________
Putty Cats are God's gift to the universe.


Top
  Profile  
 
 Post subject: "Target data breach part of broader organized attack"
PostPosted: Fri Jan 17, 2014 11:32 pm 
User avatar
I love Music & hate brickwalled audio

Joined: 27 Sep 2006
Posts: 37646
Location: The Pasture
And more................

ZD Net wrote:

Target's data breach: No, really. It gets even worse.

Summary: Target and Neiman Marcus were not the only name brand retailers to be stung by cyber criminals last holiday season.

Image

There appears to be no end in sight for just how bad the unprecedented hack attack at Target was last holiday season.

And now it looks like Target was not the lone, er, target, in this particular sting.

We've already heard about a similar style attack on the point-of-sale hardware infrastructure at high-end department store chain Neiman Marcus.

Now Reuters is reporting that cyber intelligence firm IntelCrawler has unearthed evidence pointing toward at least six ongoing schemes at U.S. merchants with credit card processing systems plagued by the same type of malicious software.

The news agency's report did not specify the other retailers afflicted by the attack -- only that the infected systems were at stores with locations in California and New York.

IntelCrawler followed up with a related memo published to its site on Friday, detailing evidence pointing to who could turn out to be the author of the BlackPOS malware that successfully lifted personal data from the magentic strips on the backs of credit cards belonging to more than 70 million Target shoppers between Thanksgiving and mid-December.

According to IntelCrawler's sources, the malware has been tested out and infected point-of-sale hardware across Australia and Canada as well as the United States.

The same dates the detailed information and reverse engineering report were shared with Visa and several major US banks, after which US LEA released internal notification for financial industry about that. The bad actor was pretty opened for trading this malware for 2 000 USD or by receiving 50% from selling of all intercepted credit cards by his customer through Liberty Reserve.

The full report and associated screenshots are available on IntelCrawler's website now, with the hypothesis that the "the age of BlackPOS malware author is close to 17 years old and the first sample of it was created in March 2013."

_________________
Putty Cats are God's gift to the universe.


Top
  Profile  
 
 Post subject: "Target data breach part of broader organized attack"
PostPosted: Thu Jan 23, 2014 5:13 pm 
User avatar
I love Music & hate brickwalled audio

Joined: 27 Sep 2006
Posts: 37646
Location: The Pasture
IMO, there needs to be a law that impacted companies are named immediately.

Sans wrote:

--Six Other Retailers Targeted by Data Thieves
(January 17, 2014)
Reports of additional retailers suffering data breaches suggest that the
attacks on Target and Neiman Marcus are part of a larger effort
involving at least half a dozen stores. The same malware appears to have
been used in all of the attacks. The other affected businesses have not
been named.
http://www.govinfosecurity.com/6-more-r ... hed-a-6407
http://news.cnet.com/8301-1009_3-576174 ... ets-worse/

http://www.computerworld.com/s/article/ ... onomyId=17


_________________
Putty Cats are God's gift to the universe.


Top
  Profile  
 
 Post subject: "Target data breach part of broader organized attack"
PostPosted: Thu Jan 23, 2014 5:14 pm 
User avatar
I love Music & hate brickwalled audio

Joined: 27 Sep 2006
Posts: 37646
Location: The Pasture
Sans wrote:
--Two People Arrested; Carrying Fraudulent Payment Cards
(January 20, 2014)
Two people arrested in Texas were found to have 90 fraudulent payment
cards in their possession. The cards appear to have been fabricated
using information that was stolen in the Target data breach.

http://www.computerworld.com/s/article/ ... onomyId=17

http://www.seattlepi.com/news/texas/art ... 160888.php
http://www.latimes.com/business/la-fi-t ... z2r1DhIHVv
[Editor's Note (Murray): While Target will be pilloried for this breach,
the fundamental vulnerability, that of credit card numbers and PINs to
replay, is not their fault. This is an industry problem for which the
card brands and issuers, not the merchants, bear the major
responsibility. These compromises are the inevitable result of the
failure of the industry to implement a replay resistant technology
(e.g., EMV) on a timely basis.]

_________________
Putty Cats are God's gift to the universe.


Top
  Profile  
 
 Post subject: "Target data breach part of broader organized attack"
PostPosted: Fri Jan 24, 2014 11:04 am 
User avatar

Joined: 20 Sep 2006
Posts: 3671
At the end of the day, this is really just a problem for the retailer and the credit card companies, isn't it? I've always assumed that my company is obligated to remove unauthorized charges from my account once detected and reported. Now, if you use a debit card and they empty your bank account, I appreciate that is a different issue, which is another reason I prefer to avoid using debit cards.


Top
  Profile  
 
 Post subject: "Target data breach part of broader organized attack"
PostPosted: Fri Jan 24, 2014 4:11 pm 
User avatar
I love Music & hate brickwalled audio

Joined: 27 Sep 2006
Posts: 37646
Location: The Pasture
As long as you're not using a debit card, you're largely correct. However, this appears to be total id theft (not just card #'s), which means they can order services in your name (cell phones, plane tickets, Google add clickthrough payments, etc), & having been through this, you would likely win, but it's time consuming.

_________________
Putty Cats are God's gift to the universe.


Top
  Profile  
 
 Post subject: "Target data breach part of broader organized attack"
PostPosted: Fri Jan 24, 2014 4:57 pm 
User avatar
I love Music & hate brickwalled audio

Joined: 27 Sep 2006
Posts: 37646
Location: The Pasture
We've now got an admission that it goes back AT LEAST to July 2013. I'm quite certain that there will be more to come.

Sans wrote:

--More Details on Neiman Marcus Data Breach
(January 23, 2014)
In a statement on its website, retailer Neiman Marcus says that a
recently acknowledged data breach of point-of-sale systems at stores
affected 1.1 million payment card accounts. The data were stolen between
July 16 and October 30, 2013. Although the FAQ portion of Neiman
Marcus's breach notice says that the company has "no knowledge of any
connection to" the Target breach, the same malware appears to have been
used in both breaches.
http://www.zdnet.com/neiman-marcus-1-1- ... 000025513/
http://www.nytimes.com/2014/01/24/busin ... cards.html

http://www.neimanmarcus.com/NM/Security ... yInfo_0114
[Editor's Note (Murray): Both Target and N-M continue to use the term
"point-of-sale" in their PR even as such little other information as
they have disclosed makes it unlikely that the Windows based malware
could possibly have run at the point-of-sale. While it is possible that
they even think of these servers as part of their point-of-sale system,
use of this term is at best confusing, in some cases obviously
misleading. The likely point of compromise is credentials of privileged
users of payment system servers. The methods of attack are those well
documented by the Verizon Data Breach Incident Report. The appropriate
responses include Strong Authentication for privileged users and
two-step or two-person controls for any change to software on these
systems.
(Paller): Actually it appears the attack did exploit Windows-based point
of sale systems, though the original entry point was likely separate
(wireless are SQL injection are possibilities). The solutions Bill
Murray points out are useful as an interim fix, but a much better fix
is to move to chip and pin credit cards as Europe has done. Sadly, the
credit card companies earn profits on fraudulent transactions - only the
retailers lose money. Unless the retailers stand up, as one, to demand
chip and pin, the credit card companies probably won't make the needed
investment.]

_________________
Putty Cats are God's gift to the universe.


Top
  Profile  
 
 Post subject: "Target data breach part of broader organized attack"
PostPosted: Tue Mar 04, 2014 4:39 pm 
User avatar
I love Music & hate brickwalled audio

Joined: 27 Sep 2006
Posts: 37646
Location: The Pasture
Sans wrote:
Sears joins Neiman Marcus and Target in the public breach spotlight.
More retailers will be joining their club soon.


--Secret Service and Sears Investigating Possible Breach of Corporate Network
(February 28 & March 1, 2014)
Despite reports that the US Secret Service is investigating a possible
attack on the network of Sears Holding Corp., the company says it has
found no indication of a breach of its systems. Sears is "actively
reviewing [its] systems to determine if [it has] been a victim of a
breach." It is possible that the suspicion of a breach was raised by a
false alarm in banks' anti-fraud systems. Common Point of Purchase
analysis conducted in the wake of another breach could fail to account
for overlapping purchase patterns and set off a false alarm.
http://www.theregister.co.uk/2014/03/01 ... stigation/

http://arstechnica.com/security/2014/02 ... -of-sears/
http://krebsonsecurity.com/2014/02/brea ... defensive/
[Editor's Note (Pescatore): Haven't seen much mention of the Secret
Service in breach investigations in a while. It would be good to see the
US government go back to focusing on cyber-attacks as crime vs. a threat
to national defense.]


Sans wrote:
--Sands Casino Says Breach Did Compromise Some Customer and Employee Data
(February 28, 2014)
The Las Vegas Sands Casino now says that attackers who breached company
websites in February did compromise customer and employee data,
including Social Security numbers (SSNs) and driver's license numbers.
Initially, the casino said that customer data were unaffected. The
breach affected customers at the casino's Bethlehem, Pennsylvania
location. The Sands is trying to determine if other locations were
affected as well. The breach affects less than one percent of the
Pennsylvania casino's customers since its 2009 opening, but a number was
not provided. The intruders also accessed a mailing database.

http://www.scmagazine.com//las-vegas-sa ... le/336569/

http://www.nbcnews.com/tech/security/sa ... len-n41601


Sans wrote:
--Illinois Bank Urges People to Stop Using Credit Cards in Cabs in Chicago
(March 3 & 4, 2014)
First American Bank in Illinois is urging cab riders in Chicago to avoid
paying with credit or debit cards, warning of an ongoing data breach
that seems to be connected with card processing systems used by a large
number of taxis in Chicago. First American became aware of the situation
in early February when several customers complained about fraudulent
charges on their accounts. The commonality among the cards was having
been used in Chicago taxis. The bank has begun cancelling the cards of
customers who charge taxi fare and issuing them new ones. The bank has
reported the issue to MasterCard.
http://krebsonsecurity.com/2014/03/illi ... ago-taxis/

http://www.scmagazine.com/bank-reports- ... le/336550/

http://arstechnica.com/security/2014/03 ... customers/
http://www.theregister.co.uk/2014/03/04 ... cash_only/
[Editor's Comment (Murray): The retail payment system, based upon
mag-stripes and credit card numbers, is fundamentally broken. Warning
people not to use it in specified places is the same as saying it is not
safe to use. While issuers push the cost of fraud onto the merchants,
the cost is systemic; we are all paying it. Only the card issuers can
fix it.
(Northcutt): In the US the customer is largely protected if the 16 digit
Primary Account Number (PAN) is compromised. However, when my card gets
exposed because some retailer failed to protect my PAN, I may not lose
money, but I lose time. I have to fix it with my auto insurance, my
water utility, Amazon and who knows how many other providers. I have
been through this three times in the past two years. The best solution
would be multi-factor authentication. If you have followed the last few
issues of NewsBites you can probably guess I am doing research to update
my course on multi factor. I envision a USB key with an embedded chip
that keeps my PAN from being intercepted by a keystroke logger, or a Man
in the Middle attack from my browser and EVEN from my hapless retail
vendor. Instead, it would go directly to the payment gateway and my
vendor would receive a "transaction approved" record. I know about the
iron key solution, if you know about others I would love to hear from
you, (stephen@sans.edu). I know about chip and pin: it is part of the
solution. I think we need to employ it in the U.S. to catch up with the
rest of the world, but it is not THE complete solution:
http://creditcardforum.com/blog/chip-an ... cards-usa/
http://www.sans.org/course/security-lea ... ompression ]

_________________
Putty Cats are God's gift to the universe.


Top
  Profile  
 
 Post subject: "Target data breach part of broader organized attack"
PostPosted: Mon May 05, 2014 10:05 am 
User avatar
I have no fear of this machine

Joined: 23 Sep 2007
Posts: 8297
Target CEO Gregg Steinhafel Resigns In Data Breach Fallout

Clare O'Connor, Forbes Staff
5/05/2014
http://www.forbes.com/sites/clareoconno ... h-fallout/


Click for full size

Target's CEO is the latest casualty of the widespread data breach that saw hackers steal personal data and credit card information from millions of customers.

On Monday, the Minneapolis-based retail chain announced that 35-year company veteran Gregg Steinhafel had stepped down effective immediately.

Target’s CFO John Mulligan will lead the $40 billion (market cap) discount giant until a replacement is named.

Target’s statement referred to Steinhafel’s handling of the disastrous data breach that unfolded in December, when it became apparent that as many as 40 million shoppers’ credit card details and 70 million customers’ personal data, like addresses and numbers, had been compromised:

“He held himself personally accountable and pledged that Target would emerge a better company,” said the statement. “We are grateful to him for his tireless leadership and will always
consider him a member of the Target family.
”

Steinhafel will remain on board in an advisory capacity.

Here’s the full statement:
Quote:
“Today we are announcing that, after extensive discussions, the board and
 Gregg Steinhafel have decided that now is the right time for new leadership at
 Target. Effective immediately, Gregg will step down from his positions as
 Chairman of the Target board of directors, president and CEO. John Mulligan,
 Target’s chief financial officer, has been appointed as interim president and chief executive officer. Roxanne S. Austin, a current member of Target’s board
 of directors, has been appointed as interim non-executive chair of the board.
 Both will serve in their roles until permanent replacements are named. We have 
asked Gregg Steinhafel to serve in an advisory capacity during this transition
and he has graciously agreed.

 The board is deeply grateful to Gregg for his significant contributions and 
outstanding service throughout his notable 35-year career with the company. We
 believe his passion for the team and relentless focus on the guest have
 established Target as a leader in the retail industry. Gregg has created a
culture that fosters innovation and supports the development of new ideas.
 Under his leadership, the company has not only enhanced its ability to
 execute, but has broadened its strategic horizons. He also led the company
 through unprecedented challenges, navigating the financial recession, reacting 
to challenges with Target’s expansion into Canada, and successfully defending 
the company through a high-profile proxy battle.

 Most recently, Gregg led the response to Target’s 2013 data breach. He held
 himself personally accountable and pledged that Target would emerge a better 
company. We are grateful to him for his tireless leadership and will always
 consider him a member of the Target family.

 The board will continue to be actively engaged with the leadership team to 
drive Target’s future success and will manage the transition. In addition to
the appointments of the exceptional leaders noted above, we have also retained 
Korn Ferry to advise the board on a comprehensive CEO search.

 The board is confident in the future of this company and views this transition
as an opportunity to drive Target’s business forward and accelerate the
 company’s transformation efforts.”


Top
  Profile  
 
 Post subject: "Target data breach part of broader organized attack"
PostPosted: Mon May 05, 2014 1:13 pm 
User avatar
I love Music & hate brickwalled audio

Joined: 27 Sep 2006
Posts: 37646
Location: The Pasture
If I buy the Sarah M cd, I will use cash!

Though I'm sure this is effecting all major retailers, just Target got caught by the FBI & had to admit to it.

Having credit card #'s stolen today is a fact of life no matter how careful one is. It's really only 2 issues:

1. The time us consumers have to spend talking to the bank.

2. If it's a debit card, you're truly out the money temporarily, usually for 2-4 weeks.

_________________
Putty Cats are God's gift to the universe.


Top
  Profile  
 
Display posts from previous:  Sort by  
Post new topic Reply to topic  [ 11 posts ]   



Who is WANline

Users browsing this forum: JosephC and 1 guest


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot post attachments in this forum

Search for:
Jump to:  


Powdered by phpBB® Forum Software © phpBB Limited

IMWAN is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide
a means for sites to earn advertising fees by advertising and linking to amazon.com, amazon.ca and amazon.co.uk.