It’s not just Target. Neiman Marcus on Friday disclosed hackers may have stolen the credit and debit card numbers of its customers. While Target is reporting at least 70 million customers were affected, the luxury retailer isn’t yet sure how deep its server breach runs.
We caught up with Chris Petersen, CTO and co-founder of LogRhythm, a log analysis firm, for his take on the beach. He told us he wonders just how broad this targeted attack against retailers could actually be. Does it span beyond Target and Neiman Marcus? Or are these isolated incidents?
“Currently, there is no national breach disclosure law. While most states do have such laws, the teeth of the law are often insufficient to overcome concern regarding brand damage,” Petersen said. “Most breaches that go public still do so as a result of a third-party reporting. What we don’t know is how many other companies were breached, or still are, from this same or similar attack."
Stuxnet Invading Retailers?
As Petersen sees it, the scale of the Target breach speaks to the sophistication of the organization and the methods behind it. With Neiman Marcus reporting a similar breach, Petersen wonders if we've seen a cybercrime-driven Stuxnet-like capability applied to retail corporations.
“Like Stuxnet, it would appear stealthy malware was introduced focused on compromising thousands of specific systems where cardholder and PIN could be accessed in unencrypted form, likely via a memory scraper,” Petersen said. “To successfully accomplish this, highly sophisticated malware was almost certainly developed and deployed.”
According to Petersen, this malware would need to compromise systems en route to intended targets and remain stealthy in the process, only going active once the scale of compromise was sufficient to achieve the designers objective -- en mass data theft. He concluded that these are capabilities similar to the military-class malware Stuxnet is believed to have been in 2010.
Retailers at Risk
We also turned to Tom Cross, director of Research at Lancope, to get his thoughts on the retailing breaches. With the possibility that a large number of retail organizations may have been victims of the same set of attacks, he told us other retail businesses have to be asking if they were compromised as well.
“It has been confirmed that malware was installed on point of sale terminals at Target, so other retail organizations should be taking a close look at their point of sale systems,” Cross said.
"Retail organizations should be looking at how well prepared their organization is to identify a compromise like this after it has taken place, investigate that compromise, and clean it up. Organizations often under-invest in incident response capabilities because they view those capabilities as reactionary and would prefer to prevent incidents up front. However, even the best preventative approaches will sometimes fail and you need to be prepared for that," Cross said.