Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: catnipman
Compromised POS systems were all Windows systems.

The compromise was at the server level. The hackers installed a compromised server on the network and read the data from the POS terminals in real-time.

IOW, they had insider help or used social engineering to gain admin-level network access.

So, in this case, at least, using Linux would have made no difference at all.

16 posted on 01/16/2014 9:36:30 AM PST by Ol' Dan Tucker (People should not be afraid of the government. Government should be afraid of the people)
[ Post Reply | Private Reply | To 13 | View Replies ]


To: Ol' Dan Tucker
It does look like an inside job:

"But according to sources, the attackers broke in to Target after compromising a company Web server. Somehow, the attackers were able to upload the malicious POS software to store point-of-sale machines, and then set up a control server within Target’s internal network that served as a central repository for data hoovered by all of the infected point-of-sale devices.

“The bad guys were logging in remotely to that [control server], and apparently had persistent access to it,” a source close to the investigation told KrebsOnSecurity. “They basically had to keep going in and manually collecting the dumps"

21 posted on 01/16/2014 10:03:54 AM PST by uncommonsense (Liberals see what they believe; Conservatives believe what they see.)
[ Post Reply | Private Reply | To 16 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson