Newsletters
Customer Relationship Management News NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home CRM Systems Customer Service Business Intelligence Sales & Marketing More Topics...
Neustar, Inc.
Protect your website & network
using real-time information & analysis

www.neustar.biz
Data Security
Register for a certification exam.
Average Rating:
Rate this article:  
Analysts: Retailers Must Be Vigilant After Hacks
Analysts: Retailers Must Be Vigilant After Hacks

By Jennifer LeClaire
January 13, 2014 10:26AM

Bookmark and Share
There's a possibility that many retail organizations may have been victims of the same set of malware attacks as Target and Neiman Marcus. Retail organizations including Target and Neiman Marcus should be looking at how well prepared they are to identify a compromise after it has taken place, investigate that compromise, and clean it up.
 



It’s not just Target. Neiman Marcus on Friday disclosed hackers may have stolen the credit and debit card numbers of its customers. While Target is reporting at least 70 million customers were affected, the luxury retailer isn’t yet sure how deep its server breach runs.

We caught up with Chris Petersen, CTO and co-founder of LogRhythm, a log analysis firm, for his take on the beach. He told us he wonders just how broad this targeted attack against retailers could actually be. Does it span beyond Target and Neiman Marcus? Or are these isolated incidents?

“Currently, there is no national breach disclosure law. While most states do have such laws, the teeth of the law are often insufficient to overcome concern regarding brand damage,” Petersen said. “Most breaches that go public still do so as a result of a third-party reporting. What we don’t know is how many other companies were breached, or still are, from this same or similar attack."

Stuxnet Invading Retailers?

As Petersen sees it, the scale of the Target breach speaks to the sophistication of the organization and the methods behind it. With Neiman Marcus reporting a similar breach, Petersen wonders if we've seen a cybercrime-driven Stuxnet-like capability applied to retail corporations.

“Like Stuxnet, it would appear stealthy malware was introduced focused on compromising thousands of specific systems where cardholder and PIN data could be accessed in unencrypted form, likely via a memory scraper,” Petersen said. “To successfully accomplish this, highly sophisticated malware was almost certainly developed and deployed.”

According to Petersen, this malware would need to compromise systems en route to intended targets and remain stealthy in the process, only going active once the scale of compromise was sufficient to achieve the designers objective -- en mass data theft. He concluded that these are capabilities similar to the military-class malware Stuxnet is believed to have been in 2010.

Retailers at Risk

We also turned to Tom Cross, director of Research at Lancope, to get his thoughts on the retailing breaches. With the possibility that a large number of retail organizations may have been victims of the same set of attacks, he told us other retail businesses have to be asking if they were compromised as well.

“It has been confirmed that malware was installed on point of sale terminals at Target, so other retail organizations should be taking a close look at their point of sale systems,” Cross said.

"Retail organizations should be looking at how well prepared their organization is to identify a compromise like this after it has taken place, investigate that compromise, and clean it up. Organizations often under-invest in incident response capabilities because they view those capabilities as reactionary and would prefer to prevent incidents up front. However, even the best preventative approaches will sometimes fail and you need to be prepared for that," Cross said.
 

Tell Us What You Think
Comment:

Name:



You have the experience and skills, let an ISACA® certification demonstrate your value. Our certifications announce that you have the expertise and insight to speak with authority. ISACA certification is more than a credential; it's a platform that can elevate your career. Register for an Exam Today.


 Data Security
1.   Juniper DDoS for High-IQ Networks
2.   Google Hacker Team to Hunt Bugs
3.   Cloud Firms Offer Azure Starter Kit
4.   FBI Cyber-Expert's Humble Start
5.   Chinese Hackers Hit U.S. Officials


advertisement
Gartner Rates IT Security Companies
IBM, HP, McAfee, Splunk ranked well.
Average Rating:
Hackers Target Western Energy Firms
Appears to be state-sponsored group.
Average Rating:
IBM Uncovers Android Security Flaw
Ten percent of devices at risk.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
34 European Banks Hit by Android-Skirting Malware
Criminals have been finding gaping holes in Android-based two-factor authentication systems that banks around the world are using. The result: 34 banks in four European countries have been hit.
 
New Web Tracking Technologies Defeat Privacy Protections
Recently developed Web tracking tools are able to circumvent even the best privacy defenses, according to a new study by researchers at Princeton and the University of Leuven in Belgium.
 
Juniper DDoS Solution Aims at High-IQ Networks
In the face of more complex attacks, Juniper Networks is boosting its DDoS Secure solution to help companies mitigate the threats with more effective security intelligence throughout the network fabric.
 

Enterprise Hardware Spotlight
Contrary to Report, Lenovo's Staying in Small Windows Tablets
Device maker Lenovo has clarified a report that indicated it is getting out of the small Windows tablet business -- as in the ThinkPad 8 and the 8-inch Miix 2. But the firm said it is not exiting that market.
 
Seagate Unveils Networked Drives for Small Businesses
Seagate is out with five new networked attached storage products aimed at small businesses. The drives are for companies with up to 50 workers, and range in capacity from two to 20 terabytes.
 
Another Day, Another Internet of Things Consortium Is Born
In the emerging Internet of Things, zillions of devices will be talking to each other. Samsung, Intel and Dell just formed a consortium to ensure each thing can understand what others are saying.
 

Mobile Technology Spotlight
Apple Patent for Smart Watch Comes to Light
Does a new smart watch patent issued to Apple provide a preview of the expected wearable from the tech giant? Some Apple-watchers are parsing the patent for signs of the coming product.
 
Will iPhone 6 Cannibalize Apple's Tablet Sales?
Could Apple’s iPhone 6 -- it’s so-called super-size phone due to hit store shelves this fall -- come back to haunt the smartphone maker? Some observers say yes; others say preposterous.
 
Axed Nokia X Phones Suffered from Lack of Identity
So long, Nokia X, we hardly knew you. The Nokia X phones Microsoft discontinued blend two rival operating systems, but leave out the best of each. As a result, the devices didn't become a runaway hit.
 

Navigation
CRM Daily
Home/Top News | CRM Systems | Customer Service | Business Intelligence | Sales & Marketing | Contact Centers | Customer Data | CRM Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.