Forty-million people who used credit or debit cards at Target stores between Thanksgiving and 15 December of this year must now change their PIN numbers or passwords or get new cards, following a nationwide hack of the retailer's checkout systems.Rico says he, fortunately, rarely shops at Target... (But, yes, thumb screws would be appropriate if they catch these assholes.) And how appropriate is POS for this? (And why is it always Russians and Ukrainians?)
You may not like the fact that these hackers pulled off such a massive— and massively inconvenient— sting. But you've got to admire their ingenuity. First, note that the hack did not go through Target.com, the retailer's online website. If you shopped online at Target, your credit card info is probably safe.
Rather, the hackers went through the physical checkout systems inside every Target store. That's nearly two thousand stores: 1,797 stores in the US and another 124 in Canada. The hack focused on Target's point-of-sale, or POS system. As shoppers swiped or punched in their numbers on the checkout keypad, the hackers copied every single number, according to Brian Krebs, whose tech security blog has broken scoop after scoop on password hacking.
Previously, criminals who wanted to take credit card numbers and the PIN numbers that went with them would have to use a clumsy real-world subterfuge. They would fix a thin pad on top of an ATM's keypad, and capture both the credit card number as it swiped in and out through the pad's card slot plus the PIN as it was punched in on the keypad. Those numbers allow you to create dummy cards from "blank" cards with magnetic strips on them that can be used in ATMs or online to withdraw cash, in exactly the same way a real card works. But you can only get a few hundred cards a day that way, one machine at a time. And the hackers have to appear at the scene of the crime twice— once to install the pad and once to remove it— in order to get their numbers.
The Target thieves appear to have scaled up their skimming operation so that Target's POS system skimmed numbers across the entire store system. That probably involved installing malware that spread itself throughout Target's brick and mortar stores, according to The New York Times:To pull it off, security experts said a company insider could have inserted malware into a company machine, or persuaded an unsuspecting employee to click on a malicious link that downloaded malware that gives cybercriminals a foothold into a company’s point-of-sale systems.A bunch of similar ripoffs have occurred at major retailers recently. Sixty-three Barnes & Noble stores were stung last year. In 2007, retailer TJ Maxx learned thieves used its store’s wireless networks to access systems at its headquarters where card data was stored. The thieves scooped 45 million cards. And, in 2009, credit card processor Heartland Payment Systems lost 130 million card numbers when hackers installed malware on its internal systems.
The thieves now have forty million blank cards with correct numbers and PINs, and can withdraw cash from ATMs at their leisure.
Remarkably few people have been behind the ambitious heists. Back in July, prosecutors brought charges against five people— four Russians and a Ukrainian— who allegedly lifted 160 million credit cards from J.C. Penney, 7-Eleven, Nasdaq OMX Group, JetBlue, and others over several years.
19 December 2013
Hackers, and not nice ones, either
Jim Edwards has a Slate article (via Business Insider) about Target shoppers getting ripped off:
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment