CIO Today HOME LATEST NEWS NEWSLETTERS SEARCH Search
  LATEST NEWS FOR WEDNESDAY MARCH 1

Close Search Box
CIO Today
COMPUTING
Analysts: Retailers Must Be Vigilant After Hacks
Posted January 13, 2014
Analysts: Retailers Must Be Vigilant After Hacks
Next Story
EARLIER
Analysts Say Target's Entire Network Breached
THIS STORY
Analysts: Retailers Must Be Vigilant After Hacks
Next Story
LATER
Public-Cloud Lessons Learned After Dropbox Outage
YOU ARE HERE:   HOME arrow COMPUTING arrow THIS STORY
NEWS OPS

By Jennifer LeClaire. Updated January 13, 2014 10:26AM

SHARE

ALSO SEE

It’s not just Target. Neiman Marcus on Friday disclosed hackers may have stolen the credit and debit card numbers of its customers. While Target is reporting at least 70 million customers were affected, the luxury retailer isn’t yet sure how deep its server breach runs.

We caught up with Chris Petersen, CTO and co-founder of LogRhythm, a log analysis firm, for his take on the beach. He told us he wonders just how broad this targeted attack against retailers could actually be. Does it span beyond Target and Neiman Marcus? Or are these isolated incidents?

“Currently, there is no national breach disclosure law. While most states do have such laws, the teeth of the law are often insufficient to overcome concern regarding brand damage,” Petersen said. “Most breaches that go public still do so as a result of a third-party reporting. What we don’t know is how many other companies were breached, or still are, from this same or similar attack."

Stuxnet Invading Retailers?

As Petersen sees it, the scale of the Target breach speaks to the sophistication of the organization and the methods behind it. With Neiman Marcus reporting a similar breach, Petersen wonders if we've seen a cybercrime-driven Stuxnet-like capability applied to retail corporations.

“Like Stuxnet, it would appear stealthy malware was introduced focused on compromising thousands of specific systems where cardholder and PIN data could be accessed in unencrypted form, likely via a memory scraper,” Petersen said. “To successfully accomplish this, highly sophisticated malware was almost certainly developed and deployed.”

According to Petersen, this malware would need to compromise systems en route to intended targets and remain stealthy in the process, only going active once the scale of compromise was sufficient to achieve the designers objective -- en mass data theft. He concluded that these are capabilities similar to the military-class malware Stuxnet is believed to have been in 2010.

Retailers at Risk

We also turned to Tom Cross, director of Research at Lancope, to get his thoughts on the retailing breaches. With the possibility that a large number of retail organizations may have been victims of the same set of attacks, he told us other retail businesses have to be asking if they were compromised as well.

“It has been confirmed that malware was installed on point of sale terminals at Target, so other retail organizations should be taking a close look at their point of sale systems,” Cross said.

"Retail organizations should be looking at how well prepared their organization is to identify a compromise like this after it has taken place, investigate that compromise, and clean it up. Organizations often under-invest in incident response capabilities because they view those capabilities as reactionary and would prefer to prevent incidents up front. However, even the best preventative approaches will sometimes fail and you need to be prepared for that," Cross said.

Tell Us What You Think
Comment:

Name:

MORE IN COMPUTING

Next Article >

NETWORK SECURITY SPOTLIGHT
This Spotlight
Is Brought to You By:

INSIDE CIO TODAY NETWORK SITES SERVICES BENEFITS