GO
Loading...

How the Target hackers did it

Friday, 17 Jan 2014 | 2:16 PM ET

Hackers responsible for carrying out a massive theft of credit and debit card information from the retailer Target likely used sophisticated variations of tools that have been circulating in the computer underground for a long time, according to report prepared by cyber security firm iSight Partners and the U.S. Department of Homeland Security.

Getty Images

The report explained that malware aimed at "point of sale" or POS machines, is sold in black markets and is generally well-known to law enforcement. The popularity of the software, iSight said, may lead to a demand for more custom-made attack tools. In July of 2013 in one marketplace for freelance hackers — think of it as a Craigslist for criminals — as many as 20 percent of the ads were for the creation of POS malware.

Re/code has the full story here.

By Arik Hesseldahl, recode.net.

CNBC's parent NBC Universal is an investor in re/code's parent Revere Digital, and the companies have a content-sharing arrangement.

  Price   Change %Change
TGT
---

Featured

Contact Technology

  • CNBC NEWSLETTERS

    Get the best of CNBC in your inbox

    › Learn More
  • Matt Hunter is the senior technology editor at CNBC.com.

  • Cadie Thompson is a tech reporter for the Enterprise Team for CNBC.com.

  • Working from Los Angeles, Boorstin is CNBC's media and entertainment reporter and editor of CNBC.com's Media Money section.

  • Jon Fortt is an on-air editor. He covers the companies, start-ups, and trends that are driving innovation in the industry.

  • Lipton is CNBC's technology correspondent, working from CNBC's Silicon Valley bureau.

  • Mark is CNBC's Silicon Valley/San Francisco Bureau Chief covering technology and digital media.