It turns out Target could have easily prevented its massive security breach (2024)

Chris Smith

The massive breach that occurred around Thanksgiving last year could have been prevented by Target’s existing security personnel and advanced security software, an extensive investigative report from Bloomberg Businessweek reveals. But instead, Target did nothing, allowing hackers to steal over 40 million credit cards, as well as personal data for over 70 million customers.

Six months before the data heist, Target spent $1.6 million on a sophisticated anti-malware system called FireEye that actually caught the hack and could have automatically eradicated the malware without any human interaction. But that feature was turned off, as it’s believed the newly purchased, and tested system, was still mistrusted by Target’s security personnel. “Typically, as a security team, you want to have that last decision point of ‘what do I do,’” Bombardier Aerospace chief information security officer said about FireEye, a software the company has been using for more than a year.

The same security system is employed by the CIA, the Pentagon and other spy agencies around the world, and has an interesting way of catching malware attacks in real-time instead of reacting to known malware only, as antivirus programs do. The system creates a parallel computer network on virtual machines that capture any data that comes from the web to Target, while attackers actually believe they’re inside their target – no pun intended.

Thus, the system captured the first malware code on November 30 and issued an alert that was ignored. After using credentials from a HVAC company working for Target, hackers uploaded as many as five versions of the malware, which was disguised with a name related to a component in a data center management product – BladeLogic. FireEye was able to catch each one of them and escalate the warning alerts. But Target did not react to any of these notifications.

Even the Symantec Endpoint Protection antivirus program used by Target detected the malware around Thanksgiving issuing appropriate warnings, that were also ignored. In fact, it looks like “the malware utilized is absolutely unsophisticated and uninteresting,” according to McAfee director of threat intelligence operations Jim Walter.

The company also has a team of security experts in Bangalore, that continuously monitors Target’s network. The team got the alert on November 30, and passed it on to the security team in Minneapolis. “And then… Nothing happened.”

Only on December 2 did the hackers start downloading the collected data to Russia through U.S. servers where they have temporarily gathered the data. From the 1797 U.S. Target stores, the hackers collected over 11GB of data. Federal law enforcement was able to actually get the data which was carelessly left on the hackers’ U.S. temporary servers, and contacted Target about the breach on December 12.

It took three more days for Target to publicly acknowledge the hack. During a testimony before U.S. Congress, Target “has said that it was only after the U.S. Department of Justice notified the retailer about the breach in mid-December that company investigators went back to figure out what happened,” without mentioning that the store could have prevented everything had the warnings been acknowledged in the first days.

A manhunt for the people responsible for the hack has begun, with the main suspect being an Ukrainian 22-year old hacker that has been caught before stealing private data from a popular forum in his own country. The identity of the person has apparently confirmed by various sources, although there’s no clear evidence pointing at him. Because the hackers left various traces in the malware that helped investigators discover his presumed identity, it is believed he was the ringleader of a band of hackers that performed the attack – he was the George Clooney that hired the other members of an Ocean 11-like team, and who wrote the malware which the others then used to mine data from Target’s servers. Other clues left by the hackers suggest they may have been behind at least six other data thefts over the last two years.

Meanwhile, credit and debit cards stolen in the heist have been selling on the black market, with Target customers who shopped during the period the retail store’s network was hacked already suffering the consequences.

Target was hit with over 90 lawsuits related to the massive data breach, and spent over $61 million as of February 1 responding to the attack.

The entire story of how the whole Target data hack happened will appear in print on Friday in the new issue of Bloomberg Businessweek, and is available online.

More from BGR: These are the first leaked screenshots of iOS 8

This article was originally published on BGR.com

Related stories

Here's how the Target hackers pulled off their incredible heist

Target moves quickly to prevent future hacks

Target hack not possible without some old-school theft

It turns out Target could have easily prevented its massive security breach (2024)

FAQs

What could Target have done to prevent the breach? ›

Because the attack was spotted early, the whole mess could have been avoided. Except no one did anything. FireEye's automatic malware-deletion function wasn't enabled (which isn't uncommon, as many organizations want a person, rather than a machine, making the decisions), and the alerts were ignored.

How Target became aware of the security breach? ›

Target itself did not become aware of the breach through its own detection systems, but through credit card companies, who realized an attack had occurred after noticing a surge in fraudulent transactions. Target had invested in a virus detection service, which flagged malware from the attack on November 30.

How did the Target attackers get their stolen information out of Target? ›

While no one knew initially how the breach occurred, it turned out that hackers and cyber attackers accessed Target's gateway server through credentials stolen from a third-party vendor. Just over 10 years have passed since Target Corporation's cyberattack, which may have compromised 70 million debit and credit cards.

What was the root cause of the Target cyber attack? ›

The vendor accessing Target's systems was not using adequate anti-malware software, and their lack of segregation between networks led to the compromise of millions of customers' information.

How did Target recover from a data breach? ›

Target bounces back

A loyal customer base and the strong brand reputation provided Target a foundation of support during its 2013 crisis. “The retailer's positive relationships with customers helped to mitigate the impact of the breach on its reputation and customer trust,” she said.

Did Target ignore data breach warnings? ›

Target Ignored Data Breach Alarms Target Ignored Data Breach Alarms. Target confirmed Friday that the hack attack against the retailer's point-of-sale (POS) systems that began in late November triggered alarms, which its information security team evaluated and chose to ignore.

How many times has Target been hacked? ›

Additionally, approximately 70 million customer accounts were compromised. Target has had a much better record on cybersecurity since then, and, as of October 2023, no data breaches have come to light in the decade since the 2013 incident. Here's full timeline of Target data breaches, starting with the most recent.

What tool did the hackers of the Target breach use? ›

Mapping the Knowns and the Unknowns

2. The attackers used the vendor's stolen credentials to gain access to a Target hosted web services for vendors. 3. Attackers deployed the “Kaptoxa” (pronounced “Kar-toe-sha”) malware on many Target's POS machines which was used to steal credit card information.

What companies have been hacked in 2024? ›

The Biggest Data Breaches of the Year (2024)
  • AT&T. Records Breached: 7.6 million current and 65.4 million former customers. ...
  • MOVEit. Records Breached: 77 million. ...
  • Ticketmaster Entertainment, LLC. Records Breached: 560 million. ...
  • Tile. Records Breached: 450,000. ...
  • Dell. Records Breached: 49 million. ...
  • Bank of America.
Jul 10, 2024

Does Target catch people who steal? ›

The specific approach taken depends on the store's policies, the severity of the situation, and other factors. Target managers have some discretion in what security policies to apply, so it could be that your local Target does just monitor people suspected of shoplifting.

How did the Target attackers obtain the stolen information? ›

The attackers used a spear phishing attack against Target's third-party HVAC company, Fazio Mechanical Services, to steal user credentials. The hackers then used the stolen credentials and to access Target's corporate network and install malware on Target's POS devices.

How does ransomware stop the Target? ›

Ransomware is a type of malware that prevents you from accessing your computer (or the data that is stored on it). The computer itself may become locked, or the data on it might be stolen, deleted or encrypted.

What is the biggest cyber attack in history? ›

11 Biggest Cybersecurity Attacks in History
  • Real Estate Wealth Network Leak. Date: 2023. ...
  • MOVEit Transfer Data Breach. Date: 2023. ...
  • Log4J Vulnerability. Date: 2021. ...
  • Colonial Pipeline Ransomware Attack. Date: 2021. ...
  • 6. Yahoo Hacks. Date: 2013 & 2014. ...
  • Attack on Saudi Aramco. Date: 2012. ...
  • PlayStation Network Hack. ...
  • Heartland Payment Systems.
Jun 20, 2024

Was Target well protected prior to the attack? ›

Target was not well protected prior to the attack. Target's major vulnerabilities included weak security protocols and outdated software. The attack cost Target an estimated $148 million in monetary losses.

Which targets are most affected by cyberattacks? ›

Professional, Business and Consumer Services. Professional, business, and consumer services include a wide spectrum, including law firms, marketing agencies, consulting services, and more. Since these kinds of organizations work with data (often sensitive), they are a prime target for cybercriminals.

What could have been done to prevent the data breach? ›

There are several ways to prevent a data breach including: Use strong passwords. Use multi-factor authentication (MFA) Keep software up to date.

What actions did Target take to improve its security posture? ›

Some of these enhancements include:
  • Enhancing monitoring and logging. ...
  • Installation of application whitelisting point-of-sale systems. ...
  • Implementation of enhanced segmentation. ...
  • Reviewing and limiting vendor access. ...
  • Enhanced security of accounts.
Apr 29, 2014

What actions could be taken to prevent the breach from occurring again in the future? ›

Yes, data breaches can be prevented by implementing and following best practices such as using strong passwords and utilizing tools like firewalls and anti-virus software to defend against attacks. It is important to work closely with an internet security team or provider to set up these measures correctly.

What are the actions to be done in case of breach of security? ›

Secure Your Operations
  • Move quickly to secure your systems and fix vulnerabilities that may have caused the breach. ...
  • Mobilize your breach response team right away to prevent additional data loss. ...
  • Assemble a team of experts to conduct a comprehensive breach response. ...
  • Stop additional data loss.

Top Articles
Gamification in Fintech: A Complete Guide with Examples
Metals and mining: predictions for 2024 |
Printable Whoville Houses Clipart
Comforting Nectar Bee Swarm
Terraria Enchanting
Teamexpress Login
Select The Best Reagents For The Reaction Below.
Kent And Pelczar Obituaries
Nyuonsite
Bros Movie Wiki
Hssn Broadcasts
Best Fare Finder Avanti
Craigslist Mpls Cars And Trucks
Bahsid Mclean Uncensored Photo
2016 Ford Fusion Belt Diagram
Google Feud Unblocked 6969
Immortal Ink Waxahachie
Straight Talk Phones With 7 Inch Screen
Buy Swap Sell Dirt Late Model
Zack Fairhurst Snapchat
Ibukunore
Concordia Apartment 34 Tarkov
Low Tide In Twilight Ch 52
TeamNet | Agilio Software
Airtable Concatenate
Motor Mounts
DIY Building Plans for a Picnic Table
What Is The Lineup For Nascar Race Today
60 Second Burger Run Unblocked
Melissa N. Comics
Average weekly earnings in Great Britain
Www.craigslist.com Syracuse Ny
Moxfield Deck Builder
Ny Post Front Page Cover Today
CVS Near Me | Somersworth, NH
Directions To 401 East Chestnut Street Louisville Kentucky
Watchseries To New Domain
Troy Gamefarm Prices
How to Draw a Sailboat: 7 Steps (with Pictures) - wikiHow
Mcgiftcardmall.con
Ticket To Paradise Showtimes Near Marshall 6 Theatre
Stanley Steemer Johnson City Tn
Bones And All Showtimes Near Johnstown Movieplex
Joey Gentile Lpsg
Sam's Club Gas Prices Florence Sc
Thelemagick Library - The New Comment to Liber AL vel Legis
5A Division 1 Playoff Bracket
6576771660
Devotion Showtimes Near Showplace Icon At Valley Fair
What Time Do Papa John's Pizza Close
Ubg98.Github.io Unblocked
Overstock Comenity Login
Latest Posts
Article information

Author: Manual Maggio

Last Updated:

Views: 5342

Rating: 4.9 / 5 (49 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Manual Maggio

Birthday: 1998-01-20

Address: 359 Kelvin Stream, Lake Eldonview, MT 33517-1242

Phone: +577037762465

Job: Product Hospitality Supervisor

Hobby: Gardening, Web surfing, Video gaming, Amateur radio, Flag Football, Reading, Table tennis

Introduction: My name is Manual Maggio, I am a thankful, tender, adventurous, delightful, fantastic, proud, graceful person who loves writing and wants to share my knowledge and understanding with you.