The government put U.S. retailers on alert Thursday that the sophisticated data heist operation that struck Target Corp. has likely infected other companies with malicious software.
Federal authorities investigating the huge holiday security breach issued a confidential technical bulletin to merchants with detailed descriptions of the point-of-sale malware that hackers used to attack Target, seeking out other victims and offering strategies for retailers to protect themselves.
Tiffany Jones, a senior vice president with the security intelligence firm iSIGHT Partners in Dallas, said her firm worked on the report with the Department of Homeland Security, the Secret Service and the Financial Services Information Sharing and Analysis Center, an industry group.
"The use of malware to compromise point-of-sale systems is not new, but it's the first time we've seen this kind of operation at this scale and sophistication overall," Jones said in an interview. "It has the ability to potentially infect a large number of retailers."
A separate report that iSIGHT sent its clients said that the firm, the Secret Service and the cybersecurity arm of the Department of Homeland Security began working together on the issue Dec. 18. That was the day that blogger Brian Krebs broke the story on www.krebsonsecurity.com about Target's data security breach.
The new malware variant, dubbed Trojan.POSRAM, extracts payment card details from point-of-sale systems and was derived from another type of malware known as BlackPOS, the report said. At the time the new malware was discovered, it hadn't yet been detected by any antivirus defenses.
Authorities have dubbed the point-of-sale operation KAPTOXA.
Links to Russia
Jones said two reports went out, the confidential one to retailers and a second to iSIGHT clients, with similar information on the malware.