Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Michaels Retail Chain Reveals Details Of Breach: Nearly 3M Affected
Newest First  |  Oldest First  |  Threaded View
BillB031
BillB031,
User Rank: Strategist
6/1/2014 | 2:13:10 PM
databasing financial information?
Late to reading this article.... Why do the POS systems database card info? 

A simple terminal connects to the processor, transfers the card data, gets a response, and done.  There is no client side data collection. 


I guess I'm not sure why Target & Michaels need to store this data.  My capitol one card was comprimised at some point in the last year.  When I talked to them, I asked which CV code was used, and they said the CV (swiped code), not the 3 digit CVV2, which means mine was most likely one from the Target hack.

I guess I can see why a company like Target would want to dbase my name and address for marketing purposes, but databasing my finacial information without my concent should be illegal.
DarkReadingTim
DarkReadingTim,
User Rank: Strategist
4/22/2014 | 8:22:48 AM
Re: Type of Malware
 

Agreed, Robert. Michaels did not give details on the malware itself, but I was impressed that after the initial disclosure, they did come back and give some specifics on the breach and its scope. A lot of companies do only the bare minimum and try to avoid the bad headlines that a breach causes, but Michaels was willing to reveal how the breach occurred and how many customers were affected.

Attacks on POS systems have led to a number of major retail breaches, going back to the Heartland Payment Systems/TJX attacks a few years ago. Chain stores are very difficult to protect physically, and many stores continue to use older POS systems because the cost to replace them is high. Additionally, it can be easy to socially-engineer a cashier or store clerk, or to eavesdrop on wireless systems used in stores. The steps taken recently by the retail industry suggest that they are beginning to recognize the depth of the potential threat and to act to defend against it.
Robert McDougal
Robert McDougal,
User Rank: Ninja
4/20/2014 | 11:14:35 AM
Re: Type of Malware
I haven't been able to find information on the exact malware used or the infiltration method, however, it has been reported that the same group that breached Target is also behind this attack. Therefore, the malware used in this breach is probably a variant of the Target attack.
RyanSepe
RyanSepe,
User Rank: Ninja
4/19/2014 | 11:36:19 AM
Type of Malware
Has there been any report as to what type of malware was used to exploit the POS machines? Also, how were the machines infiltrated? 
securityaffairs
securityaffairs,
User Rank: Ninja
4/18/2014 | 6:18:06 PM
embarrassing
It is an embarrassing situation. The level of security offered to the customers is very poor. In many cases pos systems are common windows based machine with a few defense systems that in many cases are not sufficient to detect in time ongoing attacks. Another serious problem is related to the level of security of credit/debit card that in US still not use crypto chip.

Summing the number of compromised credit/debit cards in the different data breach occurred in 2013 in US we will obtain a disconcerting total ... nearly one of 5 card has been compromised.

It's time to think to a different approach to security.  


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Improving Enterprise Cybersecurity With XDR
Enterprises are looking at eXtended Detection and Response technologies to improve their abilities to detect, and respond to, threats. While endpoint detection and response is not new to enterprise security, organizations have to improve network visibility, expand data collection and expand threat hunting capabilites if they want their XDR deployments to succeed. This issue of Tech Insights also includes: a market overview for XDR from Omdia, questions to ask before deploying XDR, and an XDR primer.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-2287
PUBLISHED: 2022-07-02
Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.
CVE-2022-34911
PUBLISHED: 2022-07-02
An issue was discovered in MediaWiki before 1.35.7, 1.36.x and 1.37.x before 1.37.3, and 1.38.x before 1.38.1. XSS can occur in configurations that allow a JavaScript payload in a username. After account creation, when it sets the page title to "Welcome" followed by the username, the usern...
CVE-2022-34912
PUBLISHED: 2022-07-02
An issue was discovered in MediaWiki before 1.37.3 and 1.38.x before 1.38.1. The contributions-title, used on Special:Contributions, is used as page title without escaping. Hence, in a non-default configuration where a username contains HTML entities, it won't be escaped.
CVE-2022-34913
PUBLISHED: 2022-07-02
** DISPUTED ** md2roff 1.7 has a stack-based buffer overflow via a Markdown file containing a large number of consecutive characters to be processed. NOTE: the vendor's position is that the product is not intended for untrusted input.
CVE-2022-2286
PUBLISHED: 2022-07-02
Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.