GO
Loading...

Enter multiple symbols separated by commas

How the Target hackers did it

Hackers responsible for carrying out a massive theft of credit and debit card information from the retailer Target likely used sophisticated variations of tools that have been circulating in the computer underground for a long time, according to report prepared by cyber security firm iSight Partners and the U.S. Department of Homeland Security.

459184151JR00002_HACKERS_GR
Getty Images

The report explained that malware aimed at "point of sale" or POS machines, is sold in black markets and is generally well-known to law enforcement. The popularity of the software, iSight said, may lead to a demand for more custom-made attack tools. In July of 2013 in one marketplace for freelance hackers — think of it as a Craigslist for criminals — as many as 20 percent of the ads were for the creation of POS malware.

Re/code has the full story here.

By Arik Hesseldahl, recode.net.

CNBC's parent NBC Universal is an investor in re/code's parent Revere Digital, and the companies have a content-sharing arrangement.

Contact Technology

  • CNBC NEWSLETTERS

    Get the best of CNBC in your inbox

    Please choose a subscription

    Please enter a valid email address
    To learn more about how we use your information,
    please read our Privacy Policy.

Re/code

  • Co-CEO, Revere Digital; Co-Executive Editor, Re/code; and Co-Executive Producer, The Code Conference. Re/code is part of the CNBC network.

  • Co-CEO, Revere Digital; Co-Executive Editor, Re/code; and Co-Executive Producer, The Code Conference. Re/code is part of the CNBC network.

Re/code

  • Co-CEO, Revere Digital; Co-Executive Editor, Re/code; and Co-Executive Producer, The Code Conference. Re/code is part of the CNBC network.

  • Co-CEO, Revere Digital; Co-Executive Editor, Re/code; and Co-Executive Producer, The Code Conference. Re/code is part of the CNBC network.