Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Michaels Retail Chain Reveals Details Of Breach: Nearly 3M Affected
Newest First  |  Oldest First  |  Threaded View
BillB031
50%
50%
BillB031,
User Rank: Strategist
6/1/2014 | 2:13:10 PM
databasing financial information?
Late to reading this article.... Why do the POS systems database card info? 

A simple terminal connects to the processor, transfers the card data, gets a response, and done.  There is no client side data collection. 


I guess I'm not sure why Target & Michaels need to store this data.  My capitol one card was comprimised at some point in the last year.  When I talked to them, I asked which CV code was used, and they said the CV (swiped code), not the 3 digit CVV2, which means mine was most likely one from the Target hack.

I guess I can see why a company like Target would want to dbase my name and address for marketing purposes, but databasing my finacial information without my concent should be illegal.
DarkReadingTim
50%
50%
DarkReadingTim,
User Rank: Strategist
4/22/2014 | 8:22:48 AM
Re: Type of Malware
 

Agreed, Robert. Michaels did not give details on the malware itself, but I was impressed that after the initial disclosure, they did come back and give some specifics on the breach and its scope. A lot of companies do only the bare minimum and try to avoid the bad headlines that a breach causes, but Michaels was willing to reveal how the breach occurred and how many customers were affected.

Attacks on POS systems have led to a number of major retail breaches, going back to the Heartland Payment Systems/TJX attacks a few years ago. Chain stores are very difficult to protect physically, and many stores continue to use older POS systems because the cost to replace them is high. Additionally, it can be easy to socially-engineer a cashier or store clerk, or to eavesdrop on wireless systems used in stores. The steps taken recently by the retail industry suggest that they are beginning to recognize the depth of the potential threat and to act to defend against it.
Robert McDougal
50%
50%
Robert McDougal,
User Rank: Ninja
4/20/2014 | 11:14:35 AM
Re: Type of Malware
I haven't been able to find information on the exact malware used or the infiltration method, however, it has been reported that the same group that breached Target is also behind this attack. Therefore, the malware used in this breach is probably a variant of the Target attack.
RyanSepe
100%
0%
RyanSepe,
User Rank: Ninja
4/19/2014 | 11:36:19 AM
Type of Malware
Has there been any report as to what type of malware was used to exploit the POS machines? Also, how were the machines infiltrated? 
securityaffairs
100%
0%
securityaffairs,
User Rank: Ninja
4/18/2014 | 6:18:06 PM
embarrassing
It is an embarrassing situation. The level of security offered to the customers is very poor. In many cases pos systems are common windows based machine with a few defense systems that in many cases are not sufficient to detect in time ongoing attacks. Another serious problem is related to the level of security of credit/debit card that in US still not use crypto chip.

Summing the number of compromised credit/debit cards in the different data breach occurred in 2013 in US we will obtain a disconcerting total ... nearly one of 5 card has been compromised.

It's time to think to a different approach to security.  


COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/28/2020
The Problem with Artificial Intelligence in Security
Dr. Leila Powell, Lead Security Data Scientist, Panaseer,  5/26/2020
10 iOS Security Tips to Lock Down Your iPhone
Kelly Sheridan, Staff Editor, Dark Reading,  5/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13660
PUBLISHED: 2020-05-28
CMS Made Simple through 2.2.14 allows XSS via a crafted File Picker profile name.
CVE-2020-11079
PUBLISHED: 2020-05-28
node-dns-sync (npm module dns-sync) through 0.2.0 allows execution of arbitrary commands . This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. This has been fixed in 0.2.1.
CVE-2020-13245
PUBLISHED: 2020-05-28
Certain NETGEAR devices are affected by Missing SSL Certificate Validation. This affects R7000 1.0.9.6_1.2.19 through 1.0.11.100_10.2.10, and possibly R6120, R7800, R6220, R8000, R6350, R9000, R6400, RAX120, R6400v2, RBR20, R6800, XR300, R6850, XR500, and R7000P.
CVE-2020-4248
PUBLISHED: 2020-05-28
IBM Security Identity Governance and Intelligence 5.2.6 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 175484.
CVE-2020-8329
PUBLISHED: 2020-05-28
A denial of service vulnerability was reported in the firmware prior to version 1.01 used in Lenovo Printer LJ4010DN that could be triggered by a remote user sending a crafted packet to the device, causing an error to be displayed and preventing printer from functioning until the printer is rebooted...