Menu
Target says it investigated but dismissed early signs of breach

Target says it investigated but dismissed early signs of breach

A 'small amount' of possible activity was logged prior to a warning from the US Department of Justice

Hackers infected Target's point of sale terminals

Hackers infected Target's point of sale terminals

Target said it investigated but ultimately dismissed early signs of a data breach, a decision it likely regrets after suffering one of the largest payment-card and personal-data breaches on record.

The retailer said it logs a vast number of technical events each week, and "a small amount of [the criminals'] activity was logged and surfaced to our team. That activity was evaluated and acted upon," Molly Snyder, a Target spokeswoman, said in an emailed statement on Thursday.

"Based on their interpretation and evaluation of that activity, the team determined that it did not warrant immediate follow up," Snyder wrote. "With the benefit of hindsight, we are investigating whether, if different judgments had been made the outcome may have been different."

The breach of Target's network resulted in the loss of 40 million payment card details, plus 70 million other personal records, causing U.S. lawmakers to question whether companies are doing enough to protect personal data. Target's data was stolen between Nov. 27 and Dec. 15, the busiest shopping period in the U.S.

Snyder wrote that despite investing hundreds of millions of dollars in security, "the unfortunate reality is that we experienced a data breach."

She declined to provide a timeline for the early clues, but said the retailer was notified by the U.S. Department of Justice of a possible breach on Dec. 12. Target confirmed the breach three days later.

Target's cash registers, known as point-of-sale (POS) terminals, were infected with a type of malware called a "RAM scraper." The malware recorded payment card details after a card was swiped and the unencrypted data briefly sat in a system's memory.

Security experts believe a variant of "Kaptoxa," also called "BlackPOS ," was used against Target. The malware was spotted by security companies as early as March 2013.

The style of attack, which also affected luxury retailer Neiman Marcus, was notable for finding weaknesses despite a long-running effort to implement better security around card handling with the Payment Card Industry's Data Security Standard (PCI-DSS).

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk


Follow Us

Join the newsletter!

Or
Error: Please check your email address.

Tags securitymalwaredata breachintrusionTargetNeiman Marcus

Featured

Slideshows

Bumper channel crowd kicks off first After Hours of 2018

Bumper channel crowd kicks off first After Hours of 2018

After Hours made a welcome return to the channel social calendar with a bumper crowd of partners, distributors and vendors descending on The Jefferson in Auckland to kick-start 2018. Photos by Gino Demeer.

Bumper channel crowd kicks off first After Hours of 2018
Looking back at the top 15 M&A deals in NZ during 2017

Looking back at the top 15 M&A deals in NZ during 2017

In 2017, merger and acquisitions fever reached new heights in New Zealand, with a host of big name deals dominating the headlines. Reseller News recaps the most important transactions of the Kiwi channel during the past 12 months.

Looking back at the top 15 M&A deals in NZ during 2017
Kiwi channel closes 2017 with After Hours

Kiwi channel closes 2017 with After Hours

The channel in New Zealand came together to celebrate the close of 2017, as the final After Hours played out in front of a bumper Auckland crowd.

Kiwi channel closes 2017 with After Hours
Show Comments