AlliedNews.com - Grove City, Pennsylvania

Community News Network

January 17, 2014

Hackers probably attacked companies beyond Target, report says

(Continued)

WASHINGTON —

According to the iSIGHT analysis, the software infects POS terminals, sends out the stolen information, then covers its tracks by automatically deleting those files.

The difficulty of detecting and tracing the attacks is what makes them so dangerous and has allowed hackers to breach multiple retailers over the last several months, according to the report.

The malicious software, named for a Russian word that appears several times in the code, was sold in black-market web forums starting last summer and was customized by hackers to fit specific victims, making attacks more effective, iSIGHT's Watters said.

The attacks show how cybercriminals are outpacing the ability of companies to respond, Watters said.

— With assistance from Cotten Timberlake in Washington and Renee Dudley in New York.

Text Only
Community News Network
Featured Ads
Hyperlocal Search
Premier Guide
Find a business

Walking Fingers
Maps, Menus, Store hours, Coupons, and more...
Premier Guide