Archived KrebsOnSecurity Breaks Story on Target Data Breach

Status
Not open for further replies.
Looks like the guy who designed the malware that did all the damage is a teenager who lives in Russia.

http://www.huffingtonpost.com/2014/01/17/six-other-stores-are-bein_n_4618414.html

BlackPOS was developed by a hacker whose nickname is "Ree4" and who is now about 17 years old and living in St. Petersburg, Russia, according to Los Angeles-based IntelCrawler.

The teenager sold the malicious software to cybercriminals who then launched attacks on merchants, said Komarov, who has been monitoring Ree4's activities since March.
 
Found this interesting since we have had the new, huge black Verifone credit card machines for quite a while:

According to the IntelCrawler research, BlackPOS was first discovered “in the wild” in March of 2013 and a server at Neiman Marcus was infected in mid-July. From Komarov’s exchange with ree4 it is clear that for this malware “you need standalone Point-of-Sale terminals with monitor and Windows.” It does not work with Verifone systems, because they secure the credit card data before passing it to a PC where it can be scraped from RAM by BlackPOS.

http://www.forbes.com/sites/anthony...-target-malware-teen-take-a-piece-of-the-pie/

Wonder if this will prompt all Targets to switch to them.
 
So this may be old news by now but as zweipfenigge commented on this article
http://www.pcworld.com/article/2089...t-by-targetlike-hacks-security-firm-says.html

http://www.bankinfosecurity.com/atms-under-malware-attack-a-5777/op-1
It has been known about since May of last year at least

So whoever is chief security officer or whatever the post is called at Target HQ, should be fired.

You can be an apologist and say that this happened at other retailers, and that even the U.S government didn't know about this.

But if you're getting paid six figures to be a security consultant or to give advice on security for a large retailer, you should be held responsible. At a post like this you can't go by what the book says or whatever IT security certifications you have. You need to have had been a hacker yourself, you need to have had a curiosity for how shit like this happens.

Which brings me to the next point. See how that article says that shit like this could have happened with insider access to retailers?

Giving the chief security officer the benefit of the doubt, that he is not just book-smart, that he actually understands all the intricacies of an attack like this......

Get where I am going with that? Yeah.

Either way. Heads need to roll........
 
It's crazy the amount of intelligence these kids have.
If they'd only put that intelligence to good use, the results could be incredible.
What a waste.

They are putting it to good use. If it wasn't him it would have been someone else. This would have happened eventually.

They are just helping make things more secure for the future. Then again, the future brings even more "opportunities".

If Target was smart they would hire him.
 
So I'm a bit "worried".

We have tm's that are telling guests the beach occurred at our processor, and that is why multiple stores are impacted. Not that it was at the store level... I was standing there waiting to bring it up the the GSA... When I heard her say the same thing.

I'm not sure where this started in the store, it isn't what I'd heard from anyone. I'm going to see who I work with today and talk about it... Maybe. But it makes them sound.... Well, you know.
 
That is....

Anyway, why is my store telling people it wasn't just us, that it was our 3rd party payment processor that was hacked so they got more than just our stuff....

And the one gstl is also telling everyone to tell people it was just one week, not the 18 days.

I think I need to chat with my ETL if I can find him.
 
Last edited:
That's going to go over big when you ask if people want a Red Card.
 

I especially loved the gif of the bullseye with numbers streaming out of it.
This part of the article was very interesting.

The breach could have been stopped there without human intervention.
The system has an option to automatically delete malware as it’s detected.
But according to two people who audited FireEye’s performance after the breach, Target’s security team turned that function off.
 
So who resigns before they can get fired next? Steinhafel needs to go before this company tanks more than it has already.
 
Status
Not open for further replies.

Users who are viewing this thread

Back
Top