Page 2 of 2 Previous

Continued: Report says Target attackers used common methods

  • Article by: JENNIFER BJORHUS , Star Tribune
  • Last update: March 11, 2014 - 11:58 AM

The report said the thieves encrypted neither the instructions on where to send the stolen card data nor the card information itself as it was being transmitted out of Target to a remote server, a data stream that should have been detected and caught.

Walter said in an interview that the thieves hid the malware on Target’s systems with variations of UPX and Armadillo, very common “packers” that created something like a wrapper around the malware.

The report names retailers that suffered point of sale attacks in 2013 including Neiman Marcus, Michaels Stores, hotel manager White Lodging Services Corp., Harbor Freight Tools, Easton-Bell Sports and sandwich chain ’Wichcraft.

“Probably the biggest issue in this attack is that they lacked the situational awareness to identify anomalous occurrence in their environment,” Walter said.


Jennifer Bjorhus • 612-673-4683

  • related content

  • Target steps up as Major League Baseball sponsor

    Tuesday March 11, 2014

    The new deal may help the retailer’s image after the data breach, one analyst said.


    Find the latest news and information about Target Corp.

  • McAfee says hackers were able to enter Target's data system using off-the-shelf software that was easily modified. The report challenged descriptions of the Target cyber attack as "sophisticated." 2013 file photo of a Target store security guard.

  • get related content delivered to your inbox

  • manage my email subscriptions





Connect with twitterConnect with facebookConnect with Google+Connect with PinterestConnect with PinterestConnect with RssfeedConnect with email newsletters