Data Storage Today HOME LATEST NEWS NEWSLETTERS SEARCH Search
  LATEST NEWS FOR SUNDAY FEBRUARY 26

Close Search Box
Data Storage Today
DATA SECURITY
Target Malware Allegedly Written by Russian Pair
Posted January 20, 2014
Target Malware Allegedly Written by Russian Pair
Next Story
EARLIER
'123456' Surpasses 'Password' as Most Common Password
THIS STORY
Target Malware Allegedly Written by Russian Pair
Next Story
LATER
Start-Up Uses Polymorphism Against Web Attackers
YOU ARE HERE:   HOME arrow DATA SECURITY arrow THIS STORY
NEWS OPS

By Barry Levine. Updated January 20, 2014 2:10PM

SHARE

ALSO SEE

A security firm has identified two Russians as the creators of the malware behind the attack on Target that netted personal information on as many as 110 million Target customers. But the firm has also said that the attack, and possibly additional attacks, appears to have been carried out by others.

IntelCrawler, a security firm headquartered in Sherman Oaks, Calif., issued a statement on Friday that the identified BlackPOS malware may have also been used against as many as six other retailers. Recent news reports indicate that retailer Neiman Marcus has also suffered a security breach, and the U.S. Department of Homeland Security has warned about similar attacks targeting individual point-of-sale terminals.

KAPTOXA Malware

On Thursday, security company iSIGHT Partners, working with the U.S. Secret Service, announced it has determined that a new malicious software, called KAPTOXA and pronounced Kar-Toe-Sha, "has potentially infected a large number of retail information systems."

In a joint statement by Homeland Security, the Secret Service, the Financial Services Information Sharing and Analysis Center (FS-ISAC) and iSIGHT Partners, the organizations said that any company or institution with a point-of-sale system "may be at risk." A copy of the report is available from iSIGHT Partners.

On Friday, researchers at IntelCrawler first said the age of the BlackPOS malware author was about 17, that he often employs the username "ree4," and that he is based in St. Petersburg. The teen, whom they identified as Sergey Tarasov, is allegedly known in the underground as a prolific creator of malware.

The company also said it had determined that BlackPOS was first developed in March of last year, and that its original name was Kaptoxa, Russian slang for a potato. The security firm said more than 40 builds of the malware have been sold for about $2,000 each to cybercriminals in Eastern Europe and other countries, including underground shops that sell hacked credit cards.

Shibaev and Tarasov

Following its initial fingering of Tarasov, IntelCrawler subsequently revised its identification of ree4 as being Rinat Shibaev, who they said worked closely with "his technical support" Tarasov.

The revision came after Internet security blogger Brian Krebs, an ex-reporter for the Washington Post who was instrumental in bringing the Target hack to light, raised questions about whether IntelCrawler had correctly identified the person behind the software.

IntelCrawler has said that, while the two identified Russians appear to have created the software, the actual attack was carried out by some of their customers, who purchased the malware.

According to IntelCrawler, the attackers were able to plant their BlackPOS malware because the retailers' terminals used default passwords that could readily be guessed.

The economic impact of these security breaches at the retailers could be huge, according to some analysts, because these thefts of vast amounts of personal data could result in a tidal wave of class-action lawsuits, in addition to the actual theft resulting from the thieves' use of the information.

Tell Us What You Think
Comment:

Name:

GoodOldCommonSense:
Posted: 2014-01-22 @ 11:04am PT
They deserve the tidal wave of class-action lawsuits for leaving default passwords. The lawsuits should also target device manufacturers who could, with a little bit of foresight, not equip their devices with default passwords and instead generate a random one for the user on first time installation of the device.

MORE IN DATA SECURITY

Next Article >

NETWORK SECURITY SPOTLIGHT
This Spotlight
Is Brought to You By:

INSIDE DATA STORAGE TODAY NETWORK SITES SERVICES BENEFITS