海角大神

Target, six other retailers apparently no match for Russian teen鈥檚 'potato' hack

Wielding a piece of malware called 鈥榩otato鈥 in Russian, Eastern European hackers stormed past the digital firewalls of Target and six other retailers to steal credit cards belonging to a quarter of the US population.

|
Rick Wilking/REUTERS
Digital detectives have tracked the credit card heist that hit Target and other retailers to a Russian teenager who tweaked a piece of standard malware, and then sold the malicious code to dozens of Eastern European cyber-criminals.

The scope of the Christmastime Target credit card heist keeps growing as digital detectives track one of the most audacious tech age heists in history to a Russian teenager who tweaked a piece of standard malware, and then sold the malicious code to dozens of Eastern European cyber-criminals.

Target is bracing for a backlash of lost sales after reporting that over 70 million credit cards and other pieces of customer data were compromised during the heaviest shopping period of the year. The thieves grabbed everything 鈥 card numbers, pin numbers, security codes 鈥 as they were able to gain direct access to the so-called point of service, or POS, terminals familiar to every shopper.

Now, a report from some of the world鈥檚 top cyber-detectives suggests that six other retailers may also have been breached. They have not yet been named, although Neiman-Marcus鈥 disclosure of a breach last week may be connected.

For some American consumers and the big retailers, the thefts helped sour the Christmas season, raising ire and forcing Target, and now perhaps others, to downsize sales expectations for the coming year and reassess their digital security.

Meanwhile, the stolen data is being sold and bought on underground data auctions for around $100 a pop, meaning that consumers are left to sop up the potential credit mess. More broadly, the new revelations suggest that 鈥渃ybercriminals are still finding gaps in industry security 鈥 and how payment card data is handled,鈥 writes Jeremy Kirk in Computer World.

New information from Internet surveillance firms show just how audacious was the heist 鈥 basically a one-swipe pickpocket of nearly a quarter of America鈥檚 population. And the trail leads to Russia, and a 17-year-old hacker known only as 鈥渞ee4,鈥 writes Andrew Komarov, the CEO of the cyber-intelligence firm IntelCrawler, in a number of posts. Meanwhile, dozens of attorneys general have launched their own investigations into how Target was duped.

According to security experts, Ree4 took a standard piece of malware known in Russian as 鈥渒aptoxa,鈥 Russian slang for 鈥減otato,鈥 tweaked it and renamed it BlackPos. The software, which apparently can slip through the staunchest defenses undetected, was first discovered by digital forensic experts last March.

Ree4 sold the software for $2,000 or a 50 percent cut of the profits to about 40 Eastern European hackers, according to Mr. Komarov.

Those hackers, in turn, may have used so-called 鈥渂rute force鈥 tactics 鈥 throwing millions of possible passwords at retail servers until one breaks the code 鈥 and then took control of the swipe machine at the counter.

In its Jan. 14 analysis, iSight Partners, a Dallas-based information security firm now advising the US Secret Service, wrote that the attack was two-pronged.

鈥淔irst, the malware that infected Target鈥檚 checkout counters (PoS) extracted credit numbers and sensitive personal details,鈥 the firm writes. 鈥淭hen, after staying undetected for 6 days, the malware started transmitting the stolen data to an external FTP server, using another infected machine within the Target network.鈥

鈥淭he intrusion operators displayed innovation and a high degree of skill in orchestrating the various components of the activity,鈥 according to the report.

Last week, Target executives announced the No. 3 retailer would be spending $5 million for a consortium of digital security think tanks to help prevent similar attacks in the future.

鈥淐ybersecurity is fast becoming one of the biggest marketplace challenges for businesses, and a huge concern for their customers,鈥 said Mary Power, president and CEO of the Council of Better Business Bureaus, in a statement.

The fact that hackers may have used what鈥檚 been called 鈥渂argain basement鈥 software to steal credit cards right from under shoppers鈥 noses may not help immediately stanch what鈥檚 become a steady wave of criticism of Target and its handling of the breach.

But the new revelations could ultimately lead retailers to search for more reliable ways to get paid than the point-of-service terminals that are now, despite their ubiquity, apparently increasingly vulnerable.

鈥淭arget itself would do well to find the best such alternative and implement it in a high-profile way,鈥 writes Anthony Wing Kosner, in Forbes. 鈥淒isruption, however, may be the last thing this beleaguered retailer is thinking about at the moment as it hopes to maintain business as usual.鈥

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
海角大神 was founded in 1908 to lift the standard of journalism and uplift humanity. We aim to 鈥渟peak the truth in love.鈥 Our goal is not to tell you what to think, but to give you the essential knowledge and understanding to come to your own intelligent conclusions. Join us in this mission by subscribing.
QR Code to Target, six other retailers apparently no match for Russian teen鈥檚 'potato' hack
Read this article in
/USA/2014/0118/Target-six-other-retailers-apparently-no-match-for-Russian-teen-s-potato-hack
QR Code to Subscription page
Start your subscription today
/subscribe