GO
Loading...

How the Target hackers did it

Hackers responsible for carrying out a massive theft of credit and debit card information from the retailer Target likely used sophisticated variations of tools that have been circulating in the computer underground for a long time, according to report prepared by cyber security firm iSight Partners and the U.S. Department of Homeland Security.

Getty Images

The report explained that malware aimed at "point of sale" or POS machines, is sold in black markets and is generally well-known to law enforcement. The popularity of the software, iSight said, may lead to a demand for more custom-made attack tools. In July of 2013 in one marketplace for freelance hackers — think of it as a Craigslist for criminals — as many as 20 percent of the ads were for the creation of POS malware.

Re/code has the full story here.

By Arik Hesseldahl, recode.net.

CNBC's parent NBC Universal is an investor in re/code's parent Revere Digital, and the companies have a content-sharing arrangement.

Contact Technology

  • CNBC NEWSLETTERS

    Get the best of CNBC in your inbox

    Please choose a subscription

    Please enter a valid email address
    To learn more about how we use your information,
    please read our Privacy Policy.

Re/code

  • Co-CEO, Revere Digital; Co-Executive Editor, Re/code; and Co-Executive Producer, The Code Conference. Re/code is part of the CNBC network.

  • Co-CEO, Revere Digital; Co-Executive Editor, Re/code; and Co-Executive Producer, The Code Conference. Re/code is part of the CNBC network.

Re/code

  • Co-CEO, Revere Digital; Co-Executive Editor, Re/code; and Co-Executive Producer, The Code Conference. Re/code is part of the CNBC network.

  • Co-CEO, Revere Digital; Co-Executive Editor, Re/code; and Co-Executive Producer, The Code Conference. Re/code is part of the CNBC network.

Squawk Alley