Black Friday 2013 was the beginning of a crazy shopping season for consumers and hackers alike.
Consumers snapped up holiday shopping deals across the retail spectrum and hackers snapped up the data from credit card magnetic strips. A good time was had by all.
Security experts have now begun to piece together the identities and methods of the actors behind the Target breach.
The stolen data began popping up for sale in black market underground chat rooms almost immediately, just like fresh caught fish that needs to be purchased and consumed it before it begins to stink!
Fearless former Washington Post columnist Brian Krebs, was the first to report on the breach. Krebs has been infiltrating and reporting on criminal activities in underground online chat rooms since 2005.
According to Krebs:
“Key information that informs some of my best scoops is just as likely to come from people actively engaged in cybercrime as it is industry experts working to fight fraud. So, once again, a sincere thank you to all of my readers — lovers and haters alike.”
The investigators’ reports are in. I’m a risk management guy, not a computer engineer so here’s a layman’s list of 9 steps revealing: “How the attackers did it”. Continue Reading…