Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Michaels Retail Chain Reveals Details Of Breach: Nearly 3M Affected
Newest First  |  Oldest First  |  Threaded View
BillB031
50%
50%
BillB031,
User Rank: Strategist
6/1/2014 | 2:13:10 PM
databasing financial information?
Late to reading this article.... Why do the POS systems database card info? 

A simple terminal connects to the processor, transfers the card data, gets a response, and done.  There is no client side data collection. 


I guess I'm not sure why Target & Michaels need to store this data.  My capitol one card was comprimised at some point in the last year.  When I talked to them, I asked which CV code was used, and they said the CV (swiped code), not the 3 digit CVV2, which means mine was most likely one from the Target hack.

I guess I can see why a company like Target would want to dbase my name and address for marketing purposes, but databasing my finacial information without my concent should be illegal.
DarkReadingTim
50%
50%
DarkReadingTim,
User Rank: Strategist
4/22/2014 | 8:22:48 AM
Re: Type of Malware
 

Agreed, Robert. Michaels did not give details on the malware itself, but I was impressed that after the initial disclosure, they did come back and give some specifics on the breach and its scope. A lot of companies do only the bare minimum and try to avoid the bad headlines that a breach causes, but Michaels was willing to reveal how the breach occurred and how many customers were affected.

Attacks on POS systems have led to a number of major retail breaches, going back to the Heartland Payment Systems/TJX attacks a few years ago. Chain stores are very difficult to protect physically, and many stores continue to use older POS systems because the cost to replace them is high. Additionally, it can be easy to socially-engineer a cashier or store clerk, or to eavesdrop on wireless systems used in stores. The steps taken recently by the retail industry suggest that they are beginning to recognize the depth of the potential threat and to act to defend against it.
Robert McDougal
50%
50%
Robert McDougal,
User Rank: Ninja
4/20/2014 | 11:14:35 AM
Re: Type of Malware
I haven't been able to find information on the exact malware used or the infiltration method, however, it has been reported that the same group that breached Target is also behind this attack. Therefore, the malware used in this breach is probably a variant of the Target attack.
RyanSepe
100%
0%
RyanSepe,
User Rank: Ninja
4/19/2014 | 11:36:19 AM
Type of Malware
Has there been any report as to what type of malware was used to exploit the POS machines? Also, how were the machines infiltrated? 
securityaffairs
100%
0%
securityaffairs,
User Rank: Ninja
4/18/2014 | 6:18:06 PM
embarrassing
It is an embarrassing situation. The level of security offered to the customers is very poor. In many cases pos systems are common windows based machine with a few defense systems that in many cases are not sufficient to detect in time ongoing attacks. Another serious problem is related to the level of security of credit/debit card that in US still not use crypto chip.

Summing the number of compromised credit/debit cards in the different data breach occurred in 2013 in US we will obtain a disconcerting total ... nearly one of 5 card has been compromised.

It's time to think to a different approach to security.  


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-41392
PUBLISHED: 2021-09-17
static/main-preload.js in Boost Note through 0.22.0 allows remote command execution. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which invokes the dangerous openExternal Electron API.
CVE-2020-21547
PUBLISHED: 2021-09-17
Libsixel 1.8.2 contains a heap-based buffer overflow in the dither_func_fs function in tosixel.c.
CVE-2020-21548
PUBLISHED: 2021-09-17
Libsixel 1.8.3 contains a heap-based buffer overflow in the sixel_encode_highcolor function in tosixel.c.
CVE-2021-39218
PUBLISHED: 2021-09-17
Wasmtime is an open source runtime for WebAssembly & WASI. In Wasmtime from version 0.26.0 and before version 0.30.0 is affected by a memory unsoundness vulnerability. There was an invalid free and out-of-bounds read and write bug when running Wasm that uses `externref`s in Wasmtime. To trigger ...
CVE-2021-41387
PUBLISHED: 2021-09-17
seatd-launch in seatd 0.6.x before 0.6.2 allows privilege escalation because it uses execlp and may be installed setuid root.