Attacks/Breaches

5/24/2017
10:50 AM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Target Reaches Breach Settlement: $18.5 Million Fine, Security Controls

Target to cough up $18.5 million to 47 states in a settlement following its 2013 security breach, which exposed data of millions of customers.

Target will pay a total of $18.5 million to 47 states and the District of Columbia as part of an agreement with the state attorneys general, the New York Times reports.

The settlement for the 2013 security breach that compromised the data of millions of Target customers also mandates that Target implement specific security controls and a governance framework around cybersecurity, and follow certain audit and reporting guidelines.

The $18.5M payout is only a fraction of the Target breach's total cost. Target has shelled out $202 million on legal fees and other costs since the attack, the company reported in its annual statement. However, the fine is significant for a number of reasons.

"It signals the fact that the AGs will continue to use financial penalties to hold companies accountable for data breaches involving both personally identifiable information and other financial information," says Viewpost CSO Christopher Pierson, noting that $18.5M is the largest fine to date for State AGs.

Pierson acknowledges many of the security controls mandated in the settlement reportedly were already n place at Target, but says this signifies a positive direction toward a "more robust program wrapped around controls from a risk and operations perspective."

He calls this settlement a "shot across the bow" for all companies to take security and privacy seriously, and try to mitigate the number and scope of data breaches. While it does not require the CISO report to the board and CEO, it does require reporting throughout the year.

"Given the size, scope, and impact of this particular breach, it appears like an opportunity was missed to have cybersecurity be a direct reporting line to the CEO in a way that supports the cyber risks faced by major businesses today," Pierson says.

Target confirmed its systems were breached in late December 2013. Attackers stole 40 million credit card numbers, as well as their cardholders' names, expiration dates, and CVV codes. Any customer who used a credit or debit card between Nov. 27 and Dec. 15 was at risk.

This settlement marks the end of an investigation into how the hackers broke in. It was determined that attackers took credentials from a third-party vendor, and used them to breach a customer database and install malware that could be used to pilfer more customer data.

Given the attackers' point of entry, Pierson says this breach calls for the resurgence of holistic security programs that combine information assurance, vendor assurance, and procurement/contracting to ensure companies are monitoring their data and who has access to it.

Related Content

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
5/24/2017 | 11:06:52 PM
Re: Settlement
@Joe. Oh wow, I missed the initial sentence. Regardless, thanks for clarifying.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
5/24/2017 | 10:56:32 PM
Re: Settlement
@Ryan: Exactly what it says.  The states (and DC).  They were the entities who brought suit under the laws that give them standing to do so.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
5/24/2017 | 12:15:19 PM
Settlement
Who was that settlement of 18.5M paid to, exactly?
'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
Tesla Employee Steals, Sabotages Company Data
Jai Vijayan, Freelance writer,  6/19/2018
Inside a SamSam Ransomware Attack
Ajit Sancheti, CEO and Co-Founder, Preempt,  6/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-2668
PUBLISHED: 2018-06-22
389-ds-base before versions 1.3.5.17 and 1.3.6.10 is vulnerable to an invalid pointer dereference in the way LDAP bind requests are handled. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service.
CVE-2017-7466
PUBLISHED: 2018-06-22
Ansible before version 2.3 has an input validation vulnerability in the handling of data sent from client systems. An attacker with control over a client system being managed by Ansible, and the ability to send facts back to the Ansible server, could use this flaw to execute arbitrary code on the An...
CVE-2018-12648
PUBLISHED: 2018-06-22
The WEBP::GetLE32 function in XMPFiles/source/FormatSupport/WEBP_Support.hpp in Exempi 2.4.5 has a NULL pointer dereference.
CVE-2018-12641
PUBLISHED: 2018-06-22
An issue was discovered in arm_pt in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there are recursive stack frames: demangle_arm_hp_template, demangle_class_name, demangle_fund_type, do_type, do_...
CVE-2018-12642
PUBLISHED: 2018-06-22
Froxlor through 0.9.39.5 has Incorrect Access Control for tickets not owned by the current user.