BMC: No sign its products were to blame in Target breach

January 31, 2014 at 1:39AM

BMC Software said Thursday that a default password suspected of playing a role in the massive Target security breach "is not a BMC-generated password."

The Houston-based company was responding to cybersecurity blogger Brian Krebs, who wrote on Wednesday that he suspects that a component of the malware used against Target appeared to be mimicking a default password from a widely used BMC software product. But BMC said it has no evidence that this is the case.

"At this point, there is nothing to suggest that BMC BladeLogic or BMC Performance Assurance has a security flaw or was compromised as part of this attack," the company said. "BMC Software has received no information from Target or the investigators regarding the breach."

Krebs said he doesn't think the company's statement rules out the possibility that user accounts installed by BMC software may have been used to help the attackers steal card data from Target. He said BMC's own documentation shows that accounts installed with the software can be used to run simple programs.

JENNIFER BJORHUS

about the writer

about the writer

More from Business

See More
card image
Fairview Health Services

The school is changing an elective course while still working with the Eden Prairie-based health care giant after students raised concerns.

This transmission electron microscope image shows SARS-CoV-2, the virus that causes COVID-19, isolated from a patient in the U.S., emerging from the surface of cells cultured in the lab. (NIAID/TNS) ORG XMIT: 1659810
card image