Point-of-sale malware infecting Target found hiding in plain sight
KrebsOnSecurity's Brian Krebs uncovers "memory-scraping" malware on public site.
Independent security journalist Brian Krebs has uncovered important new details about the hack that compromised as many as 110 million Target customers, including the malware that appears to have infected point-of-sale systems and the way attackers first broke in.
According to a post published Wednesday to KrebsOnSecurity, point-of-sale (POS) malware was uploaded to Symantec-owned ThreatExpert.com on December 18, the same day that Krebs broke the news of the massive Target breach. An unidentified source told Krebs that the Windows share point name "ttcopscli3acs" analyzed by the malware scanning website matches the sample analyzed by the malware scanning website. The thieves used the user name "Best1_user" to log in and download stolen card data. Their password was "BackupU$r".
The class of malware identified by Krebs is often referred to as a memory scraper, because it monitors the computer memory of POS terminals used by retailers. The malware searches for credit card data before it has been encrypted and sent to remote payment processors. The malware then "scrapes" the plain-text entries and dumps them into a database. Krebs continued:
Krebs went on to report that sources told him the attackers broke into Target after hacking a company Web server. From there, the attackers somehow managed to upload the POS malware to the checkout machines located at various stores. The sources said the attackers appeared to then establish a control server inside Target's internal network that "served as a central repository for data hoovered by all of the infected point-of-sale devices." The attackers appear to have had persistent access to the internal server, an ability that allowed them to periodically log in and collect the pilfered data.
The details haven't been independently verified by Ars. That said, Wednesday's report is consistent with what's already known about the compromise. For instance, last week's news that the attackers also made off with names, mailing addresses, phone numbers, and e-mail addresses of Target customers already suggested the hackers had intruded deep inside Target's network and that the point-of-sale malware was just one of the tools used to extract sensitive data. Word that the intruders gained initial access through Target's website is also consistent with what's known about previous hacks on large holders of payment card data. Court documents filed in 2009 against now-convicted hacker Albert Gonzalez said one of the ways his gang compromised Heartland Payment Systems, as well as retailers 7-Eleven and Hannaford Brothers, was by casing their websites and exploiting SQL-injection vulnerabilities.
I just have to say that I am still amazed that there was no one who may have looked at security cameras in anyway to see these individuals. If they were where the server was and the server was located in a secure room where only authorized personel should be allowed , this should have been caught immediately . That being said , If there were camera's in the secure area where the server was located why were they not working and how in the world did they break into stores if I read correctly and install programs in the stores as well , and that not have been seen somehow ? Seem's like the security breach has awaken a lot of IT security in the retail industry and they should take what they are learning about what has happened and take more precautions or at the least try somewhat harder . I do understand it is difficult to keep up with the ongoing and moving forward criminal world or cyber criminals and such but we need to make sure we are paying a little more attention to internal operations to keep doors locked and authorization procedures put into place and enforced .
ReplyDelete