update on the investigation into the Christmas target Hacking

11:30 AM
update on the investigation into the Christmas target Hacking -

The 2013 hack that affected up to 110 million amazed target customers buyers who thought their information was safe with major retailers. In the following months, a lot of information is out of the attack. Each new revelation only served to highlight the vulnerability of personal data is in a world of computer savvy hackers.

The initial attack

After the security breach of the target during the 2013 holiday season, the retailer quickly jumped into action to assure customers it was safe to back to the store. first announcement of the target of the attack indicates that the incidents took place from November 27 to December 6. Soon after, they modified this statement, saying that consumers who bought items in Target stores between November 27 and December 15 were at risk.

This initial error was just the beginning of what would become a public relations disaster as more information came out. While the target has since taken many steps to assure customers that they are safe and to help those who were affected, the collapse will create a long-term spot on otherwise impressive company's safety record.

The Russian virus

in mid-January, the government issued a report stating that the attack against Target Corp has been linked to a Russian computer virus. The virus is known as KARTOKHA, which translates to "potato" in Russian. The virus was available on the black market in pirate for several months before the attack.

The memo noted that the anti-virus software could not detect this particular virus. the malware executed his attack in two stages. It infected the first payment devices, direct to copy the data in the magnetic stripe debit cards and credit. After the virus collected information, he performed the second part of the attack, which was to transmit data to cyber criminals. the virus used only between the hours of 10 am and 17 pm, targeting periods busiest shopping.

the CVC vendor Infected

in early February, consumers have learned how the malware entered the target. CVC provider Fazio Mechanical Services system unintentionally provided the cyber criminals necessary information to enter the target system. The virus used false credentials that match those of Fazio. Although this new information helps to fit a new piece into the puzzle, it also raises new and related issues.

The systems HVAC provider access should have remained completely separate and secure. However, hackers have gained entry into the system with identification information of CVC and managed to sneak into the payment system. Fazio argued that their only communication with Target Corp were related to billing and contract proposals.

If this is true, then a dangerous flaw in the target systems gave hackers to access secure payment information from this seemingly innocent entry point. The first mistake from Target kept all its data on the same network. Although it weakens the security system of a company, it is not a fatal flaw. Keep all systems on a single network is the cheapest and most effective for a company to run. Despite the unified network, Target should have kept all the individual systems in the network completely separate, which clearly not the case.

Phishing Email

Working backwards, the next question is how mechanical Fazio services have been victims of hackers. It seems that the attack began as a phishing email. Phishing emails have the appearance of a genuine request by email from a trusted source. These emails ask for personal information such as passwords and credit card details. E-mail can also contain a link to a malicious web page.

If the recipient either clicks on the link or respond with personal data, cyber criminals will have everything they need to carry out an attack. Phishing emails are usually sent out in bulk, so it is unlikely that Fazio was the only targeted provider. In fact, Target Corp can not have been the victim chosen until the phishing e-mail returned successfully sensitive data giving access to the store, making it a first choice for stealing customer information from holidays.

Although the lax attitude of the employee towards the suspicious email was the main weakness in this situation, the problem was exacerbated by the fact that Fazio only used the free version of a program anti-malware to protect its computers. The software has not been authorized for professional use and did not provide monitoring of threats in real time.

The Fallout business

In March, the benefits of vacation scandal finally reached the headquarters of the target in a measurable way. Beth Jacob, chief information officer of the company, has resigned. The company announced that it will seek a new external IOC after carefully considering this role and its requirements. Target Corp also external hiring for a chief compliance.

Damage Control for customers

Target customers are left with a bitter taste after this major security breach, but their financial health should not suffer major consequences. Target is responsible for fraudulent charges made following this incident. Some estimates indicate that the company might have to pay as much as $ 50 million.

Customers who shopped in Target stores between November 27 and December 15 can enjoy a free credit monitoring service for next year, as well as protection against identity theft . These measures will help keep customers safe from any threat. Consumers who are concerned about the security of their personal information should keep an eye on the bank and credit card statements for fraudulent charges, and review their credit reports for new cards fraudulently opened in their name.

Customers are also encouraged to ignore all emails that look like they are from the target, lest they fall victim to phishing scams similar to the one that started the scandal.

violation of Target holiday security has received much publicity, but it is far from the only such situation. Niemen Marcus and Sally Beauty Supply suffered similar hacks. What consumers should start with is a new understanding of the ever-present dangers, and renewed diligence about watching for signs of fraudulent activity that may indicate identity theft.

Previous
Next Post »
0 Komentar