Newsletters
Customer Relationship Management News NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home CRM Systems Customer Service Contact Centers Business Intelligence More Topics...
Big Data
24/7/365 Network Uptime!
Average Rating:
Rate this article:  
Report: Target Ignored Security Alerts Amid Hack Attack
Report: Target Ignored Security Alerts Amid Hack Attack

By Jennifer LeClaire
March 14, 2014 1:07PM

Bookmark and Share
A new investigative report into the massive Target data breach indicates that the retailer didn't pay attention to warnings from its security tool that its systems were being hacked. Although the data generated by Target's FireEye security tool could be analyzed and acted upon automatically, humans should have stepped in to determine the business risk.
 



Security researchers have analyzed the Target breach backward and forward. Now, a new investigative report indicates that Target ignored the warnings signs of a data breach.

Bloomberg BusinessWeek recently launched an investigation into the malware that opened the door for cybercriminals to steal the personal information of about 70 million consumers at the end of last year. The result of the investigation: Target ignored alerts that its systems were possibly being hacked.

Target did nothing despite the fact that its $1.6 million malware detection tool from FireEye zeroed in on the potential hack and alerted the retailer's security team, according to BusinessWeek. To get this information, the publication's reporters said they spoke to more than 10 former Target employees who were in the know about the retailer’s data security operation, as well as eight people with intimate knowledge of the attack and the fallout.

“If Target’s security team had followed up on the earliest FireEye alerts, it could have been right behind the hackers on their escape path. The malware had user names and passwords for the thieves’ staging servers embedded in the code, according to Jaime Blasco, a researcher for the security firm AlienVault Labs,” BusinessWeek reporters noted. “Target security could have signed in to the servers themselves -- located in Ashburn, Va., Provo, Utah, and Los Angeles -- and seen the stolen data sitting there waiting for the hackers’ daily pickup. But by the time company investigators figured that out, the data were long gone.”

Target Speaks Out

The publication's report elicited a statement from Target CEO Gregg Steinhafel. “Target was certified as meeting the standard for the payment card industry (PCI) in September 2013. Nonetheless, we suffered a data breach. As a result, we are conducting an end-to-end review of our people, processes and technology to understand our opportunities to improve data security and are committed to learning from this experience,” he said in an e-mail to Bloomberg BusinessWeek.

Steinhafel added that although Target is still in the middle of an ongoing investigation, it has already taken "significant steps, including beginning the overhaul of our information security structure and the acceleration of our transition to chip-enabled cards." However, he added that it would not be constructive to engage in speculation until the company completes its investigation into the hack.

The BusinessWeek report outlines Target’s security blunders, which include the revelation offered by security expert Brian Krebs of KebsOnSecurity.com that the source of the costly drama was connected to network credentials stolen from a third-party vendor -- an HVAC subcontractor that has worked at a number of Target locations as well as the locations of other top retailers.

Acceptable Risk

We asked John Shier, a security advisor at Sophos, for his take on the report. He told us security tools have the potential to generate a lot of data. While much of it can be analyzed and acted upon automatically, he noted, we also need humans to make decisions that machines can't.

“With staffing levels and security expertise in some organizations being what they are today, many companies need to triage and prioritize what and how much of this data gets looked at,” Shier said.

“I can't say if this was the case for Target but many organizations face this every day. If an organization finds themselves in this position, they need to ask themselves a couple of questions: How much data are we ignoring and what is the potential impact to the business if we miss something? It's all about acceptable risk," he added.
 

Tell Us What You Think
Comment:

Name:

guy:

Posted: 2014-03-17 @ 5:56pm PT
Taking care of customers, what a laugh Target. Forget Target

FrankTrades:

Posted: 2014-03-14 @ 3:04pm PT
I am a customer there no more.





 Big Data
1.   Watson's First Consumer-Facing Gig
2.   HP Drops $50M on Hortonworks
3.   IBM, California Partner in the Cloud
4.   Teradata Bets Big on 2 Big Data Buys
5.   Business Impact of IBM-Apple Deal


advertisement
Comcast Customer Service Fiasco
Lessons to be learned for all companies.
Average Rating:
Apple, IBM Team on Mobile Biz Apps
A match made in technology heaven.
Average Rating:
U.K. Wants Data Retention Law
After citizens right-to-privacy verdict.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Researchers Working To Fix Tor Security Exploit
Developers for the Tor privacy browser are scrambling to fix a bug revealed Monday that researchers say could allow hackers, or government surveillance agencies, to track users online.
 
Wall Street Journal Hacked Again
Hacked again. That’s the story at the Wall Street Journal this week as the newspaper reports that the computer systems housing some of its news graphics were breached. Customers not affected -- yet.
 
Dropbox for Business Beefs Up Security
Dropbox is upping its game for business users. The cloud-based storage and sharing company has rolled out new security, search and other features to boost its appeal for businesses.
 

Enterprise Hardware Spotlight
Watson Gets His First Customer Service Gig
Since appearing on Jeopardy, IBM's Watson supercomputer has been making a living using his super-intelligent knowledge base for business verticals. Now, Watson's been hired for his first customer service job.
 
Tablet Giants Apple and Samsung Feel the Heat
When a company saturates its home market with a once-hot product, expect it to pump up efforts elsewhere. Apple, for its part, is now pushing iPads to big corporations and the enterprise market.
 
Microsoft Makes Design Central to Its Future
Over the last four years, Microsoft has doubled the number of designers it employs, putting a priority on fashioning devices that work around people's lives -- and that are attractive and cool.
 

Mobile Technology Spotlight
Tablet Giants Apple and Samsung Feel the Heat
When a company saturates its home market with a once-hot product, expect it to pump up efforts elsewhere. Apple, for its part, is now pushing iPads to big corporations and the enterprise market.
 
Is the Amazon Fire Phone a Winner?
A late entry into a packed category of smartphones, Amazon's Fire phone offers a variety of unique features. Now, the reviewers are assessing if they're enough to make the phone stand out.
 
Review: Amazon Fire Offers New Ways To Use Phones
The Fire phone uses Android, but Amazon has modified it to the point that it's barely recognizable. That means the phone offers new ways to navigate, discover and, of course, shop.
 

Navigation
CRM Daily
Home/Top News | CRM Systems | Customer Service | Contact Centers | Business Intelligence | Sales & Marketing | Customer Data | CRM Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.