Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

A First Look at the Target Intrusion, Malware
Krebs On Security ^ | 1/12/2014 | Krebs

Posted on 01/16/2014 8:40:12 AM PST by BlueMondaySkipper

Last weekend, Target finally disclosed at least one cause of the massive data breach that exposed personal and financial information on more than 110 million customers: Malicious software that infected point-of-sale systems at Target checkout counters. Today’s post includes new information about the malware apparently used in the attack, according to two sources with knowledge of the matter.

(Excerpt) Read more at krebsonsecurity.com ...


TOPICS: Business/Economy; Crime/Corruption; Front Page News
KEYWORDS: breach; cybersecurity; hack; retail; security; target; targetmalware; theft
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-73 next last
To: Ol' Dan Tucker
It does look like an inside job:

"But according to sources, the attackers broke in to Target after compromising a company Web server. Somehow, the attackers were able to upload the malicious POS software to store point-of-sale machines, and then set up a control server within Target’s internal network that served as a central repository for data hoovered by all of the infected point-of-sale devices.

“The bad guys were logging in remotely to that [control server], and apparently had persistent access to it,” a source close to the investigation told KrebsOnSecurity. “They basically had to keep going in and manually collecting the dumps"

21 posted on 01/16/2014 10:03:54 AM PST by uncommonsense (Liberals see what they believe; Conservatives believe what they see.)
[ Post Reply | Private Reply | To 16 | View Replies]

To: Buckeye McFrog

I’d guess the glory of the network, the POS computers talk to local servers to update inventory and other stuff, those servers talk to WAN servers to meta all that data, and those servers can connect to other server that run basic parts of the network, which in turn are talked to by laptops run by office drones that surf porn at work. Nobody keeps domains separate anymore, creates too much work when the same stuff (like Office apps) are needed in multiple domains, they setup lots of two-way trusts and viruses spread.


22 posted on 01/16/2014 10:13:14 AM PST by discostu (I don't meme well.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: eyeamok

Maybe, but as long as your credit union uses computers, your personal information is in them and vulnerable to being stolen.


23 posted on 01/16/2014 10:19:11 AM PST by Boogieman
[ Post Reply | Private Reply | To 9 | View Replies]

To: Smokin' Joe

“Why I won’t get a debit card—straight pipeline into your funds.”

Well, that’s the bank’s problem. Most banks nowadays cover any unauthorized use of your card, as long as you report it within a certain time frame.


24 posted on 01/16/2014 10:25:53 AM PST by Boogieman
[ Post Reply | Private Reply | To 18 | View Replies]

To: BlueMondaySkipper

Darned spell-checker didn’t notice that you’d misspelled “M”.


25 posted on 01/16/2014 10:25:55 AM PST by DuncanWaring (The Lord uses the good ones; the bad ones use the Lord.)
[ Post Reply | Private Reply | To 14 | View Replies]

To: Buckeye McFrog
How would malware get into the POS system? You can’t use a cash register to go surfing on porn.com

POS endpoints have to be connected, otherwise they could now work to verify credit cards. usually such embedded devices have minimal OS and network services so there aren't a lot of weak processes to try to take over. However they probably have a mechanism to upgrade/patch the software on them remotely, and to do that you generally need a port that can push software in. That might be a way the attackers got in.

One trick they use is to send data that's way too big for the buffer (sort of like the "inbox") so that the data overflows into areas of memory it's not supposed to go to. That can crash the system and force a reboot and if you planted bad stuff on it, it will load at the reboot. Really clever hackers can do far more.

26 posted on 01/16/2014 10:26:14 AM PST by pepsi_junkie (Who is John Galt?)
[ Post Reply | Private Reply | To 2 | View Replies]

To: ShadowAce

Ping to interesting details.


27 posted on 01/16/2014 10:43:44 AM PST by BuckeyeTexan (There are those that break and bend. I'm the other kind. ~Steve Earle)
[ Post Reply | Private Reply | To 1 | View Replies]

To: pepsi_junkie

Interesting post, thanks


28 posted on 01/16/2014 10:45:14 AM PST by nascarnation (I'm hiring Jack Palladino to investigate Baraq's golf scores.)
[ Post Reply | Private Reply | To 26 | View Replies]

To: Buckeye McFrog

Looks like the hackers breached a web server and then logged onto POS servers which control the POS devices. What’s disturbing is that the hackers had a persistent connection and periodically downloaded data.


29 posted on 01/16/2014 10:47:45 AM PST by BuckeyeTexan (There are those that break and bend. I'm the other kind. ~Steve Earle)
[ Post Reply | Private Reply | To 2 | View Replies]

To: BlueMondaySkipper

bookmarking this.

NOTE: If this blogger, KrebsOn Security hadn’t received a tip and researched it, then published it, none of us would have known about it. Target never even admitted it happened until two days after he published the info, and never, ever did anything to recompense customers. Even their offer of free credit monitoring came weeks after the news broke.


30 posted on 01/16/2014 10:51:00 AM PST by JoyjoyfromNJ (everything written by me on FR is my personal opinion & does not represent my employer)
[ Post Reply | Private Reply | To 1 | View Replies]

To: pepsi_junkie
However they probably have a mechanism to upgrade/patch the software on them remotely, and to do that you generally need a port that can push software in

I don't think we will ever hear what happened, but it wouldn't surprise me if the machines didn't have a password set or a very simple one.

31 posted on 01/16/2014 10:54:04 AM PST by EVO X
[ Post Reply | Private Reply | To 26 | View Replies]

To: BlueMondaySkipper

I can see how the POS data could be collected by this malware and sent to some obscure place on Target’s servers for later collection by the bad guys, but how did it get there? I suspicion that someone within Target’s IT department with access may have done this and opened a back door for the bad guys to retrieve the hacked information. It is also possible that someone could do this by hacking into the system from outside, but then why pick Target instead of some more high end stores where customers have more to steal?


32 posted on 01/16/2014 11:49:48 AM PST by The Great RJ
[ Post Reply | Private Reply | To 1 | View Replies]

To: BlueMondaySkipper
Another interesting article.

Oh the irony

33 posted on 01/16/2014 11:56:53 AM PST by BlueMondaySkipper (Involuntarily subsidizing the parasite class since 1981)
[ Post Reply | Private Reply | To 1 | View Replies]

To: BlueMondaySkipper; All
Why do I suspicion this all has to do with another octopus arm of the gov’t - they want to know every move, every purchase, everything in your bank acct’ and your movements... etc.

We can still circumvent most by just leaving monthly bill money in checking - take rest in cash and use for purchase -

Why do you think they want to get rid of cash?

34 posted on 01/16/2014 12:55:29 PM PST by maine-iac7 (Christian is as Christian does - by their fruits)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Buckeye McFrog

If it’s on a network, it can be hacked. And recently, it has been alleged that the NSA can hack even an offline machine that had been previously compromised.


35 posted on 01/16/2014 1:12:00 PM PST by SgtHooper (If at first you don't succeed, skydiving is not for you.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Boogieman

You guys are forgetting that other data sources have your info without you doing any online transactions. Consider the IRS records, local county tax records, real estate records, credit report companies, etc. You may not enter or place your info online, but somebody else does.


36 posted on 01/16/2014 1:14:46 PM PST by SgtHooper (If at first you don't succeed, skydiving is not for you.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Smokin' Joe
Nevermind Never mind
37 posted on 01/16/2014 1:34:10 PM PST by Windflier (To anger a conservative, tell him a lie. To anger a liberal, tell him the truth.)
[ Post Reply | Private Reply | To 19 | View Replies]

To: SgtHooper
Yeah, that's why I said you might be safe. There's no such thing as completely safe from identity theft.
38 posted on 01/16/2014 1:39:30 PM PST by Boogieman
[ Post Reply | Private Reply | To 36 | View Replies]

To: JoyjoyfromNJ

One of the better investigative reporters on the web.


39 posted on 01/16/2014 1:42:29 PM PST by RKBA Democrat (Having some small say in who gets to hold the whip doesn't make you any less a slave.)
[ Post Reply | Private Reply | To 30 | View Replies]

To: BlueMondaySkipper; rdb3; Calvinist_Dark_Lord; Salo; JosephW; Only1choice____Freedom; amigatec; ...

40 posted on 01/16/2014 1:52:00 PM PST by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-73 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson