Newsletters
Customer Relationship Management News NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home CRM Systems Customer Service Business Intelligence Sales & Marketing More Topics...
APC Free White Paper
Optimize your network investment &
Enter to win a Samsung Galaxy Note

www.apc.com
Computing
Tame your scariest paperwork. Find Out How
Average Rating:
Rate this article:  
Analysts: Retailers Must Be Vigilant After Hacks
Analysts: Retailers Must Be Vigilant After Hacks

By Jennifer LeClaire
January 13, 2014 10:26AM

Bookmark and Share
There's a possibility that many retail organizations may have been victims of the same set of malware attacks as Target and Neiman Marcus. Retail organizations including Target and Neiman Marcus should be looking at how well prepared they are to identify a compromise after it has taken place, investigate that compromise, and clean it up.
 


It’s not just Target. Neiman Marcus on Friday disclosed hackers may have stolen the credit and debit card numbers of its customers. While Target is reporting at least 70 million customers were affected, the luxury retailer isn’t yet sure how deep its server breach runs.

We caught up with Chris Petersen, CTO and co-founder of LogRhythm, a log analysis firm, for his take on the beach. He told us he wonders just how broad this targeted attack against retailers could actually be. Does it span beyond Target and Neiman Marcus? Or are these isolated incidents?

“Currently, there is no national breach disclosure law. While most states do have such laws, the teeth of the law are often insufficient to overcome concern regarding brand damage,” Petersen said. “Most breaches that go public still do so as a result of a third-party reporting. What we don’t know is how many other companies were breached, or still are, from this same or similar attack."

Stuxnet Invading Retailers?

As Petersen sees it, the scale of the Target breach speaks to the sophistication of the organization and the methods behind it. With Neiman Marcus reporting a similar breach, Petersen wonders if we've seen a cybercrime-driven Stuxnet-like capability applied to retail corporations.

“Like Stuxnet, it would appear stealthy malware was introduced focused on compromising thousands of specific systems where cardholder and PIN data could be accessed in unencrypted form, likely via a memory scraper,” Petersen said. “To successfully accomplish this, highly sophisticated malware was almost certainly developed and deployed.”

According to Petersen, this malware would need to compromise systems en route to intended targets and remain stealthy in the process, only going active once the scale of compromise was sufficient to achieve the designers objective -- en mass data theft. He concluded that these are capabilities similar to the military-class malware Stuxnet is believed to have been in 2010.

Retailers at Risk

We also turned to Tom Cross, director of Research at Lancope, to get his thoughts on the retailing breaches. With the possibility that a large number of retail organizations may have been victims of the same set of attacks, he told us other retail businesses have to be asking if they were compromised as well.

“It has been confirmed that malware was installed on point of sale terminals at Target, so other retail organizations should be taking a close look at their point of sale systems,” Cross said.

"Retail organizations should be looking at how well prepared their organization is to identify a compromise like this after it has taken place, investigate that compromise, and clean it up. Organizations often under-invest in incident response capabilities because they view those capabilities as reactionary and would prefer to prevent incidents up front. However, even the best preventative approaches will sometimes fail and you need to be prepared for that," Cross said.
 

Tell Us What You Think
Comment:

Name:



APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.


 Computing
1.   Hortonworks, Concurrent To Partner
2.   Microsoft, BMC Targeting VMware
3.   APX Labs Aims To Put Glass in Business
4.   AT&T Expanding Its Gigabit Broadband
5.   How Are Web Sites Post-Heartbleed?


advertisement
Microsoft, BMC Targeting VMware
Deal simplifies cloud management.
Average Rating:
How Are Web Sites Post-Heartbleed?
Questions on open source, security.
Average Rating:
Heartbleed Exploit Could Cost Millions
But it could have been prevented.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Verizon Data Breach Report Exposes Top Threats
Beyond Heartbleed, there are cyberthreats vying to take down enterprise networks, corrupt smartphones, and wreak havoc on businesses. Verizon is exposing these threats in a new report.
 
Where Do Web Sites Stand, Post-Heartbleed?
A security firm says the vast majority of Web sites have patched themselves to protect against the Heartbleed bug, but now there are questions raised on the reliability of open-source programs.
 
White House Updating Online Privacy Policy
A new Obama administration privacy policy explains how the government will gather the user data of online visitors to WhiteHouse.gov, mobile apps and social media sites, saying much is in the public domain.
 

Navigation
CRM Daily
Home/Top News | CRM Systems | Customer Service | Business Intelligence | Sales & Marketing | Contact Centers | Customer Data | CRM Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.