1-888-643-2217 Email ABEX
Keeping you updated

Archives

Russian Teen Allegedly Sold Target Breach Software

Publication Date 01/19/2014
Source: USAToday.com 

targetA Russian teenager allegedly authored the malware behind the Target data breach during the holiday shopping season, a cyber security firm said Sunday, and the same malware may have also been involved in the Neiman Marcus attack, it says. 

IntelCrawler, based in Los Angeles, says Sergey Taraspov, with roots in St. Petersburg, authored the malicious software and reportedly sold it for about $2,000 to dozens of cybercriminals in Eastern Europe and other countries.

“The probability is rising that the perpetrator of the (Target breach) got the program from him,” says Dan Clements, IntelCrawler president.

The firm says Taraspov is “close” to 17 years old. The firm’s CEO did the first report on the malware, known as BlackPOS, earlier last year and Taraspov was identified then as the alleged author, Clements says. Taraspov allegedly is a well-known programmer of malicious code in the underground world, IntelCrawler says.

Target, the nation’s second-largest retailer, has apologized for the security breach, which it said affected up to 110 million shoppers. Neiman Marcus has not said how many customers were affected by its breach, though several security analysts have said they believe it was at least 1 million shoppers.

Officials at Target were not immediately available for comment Sunday.

Clements says IntelCrawler has uncovered six other breaches at retail stores, including two small clothing firms in Los Angeles and four mid-sized department stores in Colorado, Arizona, New York and California. The firm declined to name the retailers, but says it has forwarded information to law enforcement officials. 

The software reportedly enabled the thieves to remotely hack into the retailers’ computer systems and obtain customer credit card and pin numbers, which were sent back to a computer controlled by cyber thieves. 

State and federal officials, including the Secret Service, have launched an extensive investigation into the breaches.

 

 

Copyright 2014 USATODAY.com


Malware in Target stores breach crafted to avoid detection by all antivirus tools

targetLast weekend, retail giant Target finally disclosed that malicious software that infected point-of-sale systems at Target checkout counters was at least one cause of the data breach that occurred back in December.  The massive data breach exposed personal and financial information, including names, mailing addresses, phone numbers and email addresses of more than 110 million customers.

Target has taken considerable heat from critics who say the company waited too long to disclose the breach.

In an interview with CNBC on Jan. 12, Target CEO Gregg Steinhafel confirmed that the attackers stole card data by installing malicious software on point-of-sale (POS) devices in the checkout lines at Target stores.

Earlier this week, Seculert posted an analysis and reported: “First, the malware that infected Target’s checkout counters (PoS) extracted credit numbers and sensitive personal details. Then, after staying undetected for 6 days, the malware started transmitting the stolen data to an external FTP server, using another infected machine within the Target network.”

Thieves then use collected information to create cloned copies of the cards and use them to shop in stores for high-priced merchandise.

As Brian Krebs of Krebs on Security blog reports, he detected a network of underground cybercrime shops that were selling almost exclusively credit and debit card accounts stolen from Target stores. Those underground stores all traced back to a miscreant in Odessa, Ukraine.

Krebs continues: “Incidentally, in malware-writer parlance, the practice of obfuscating malware so that it is no longer detected by commercial antivirus tools is known as making the malware “Fully Un-Detectable,” or “FUD” as most denizens of cybercrime forums call it. This is a somewhat amusing acronym to describe the state of a thing that is often used by security industry marketing people to generate a great deal of real-world FUD, a.k.a. Fear Uncertainty and Doubt.”

These breaches underscore the importance of organizations continuously monitoring their systems for suspicious changes and unknown programs on their systems, as well as providing their employees with security awareness training.

Once the breach happens, it is imperative that a business continuity plan be executed in a timely manner and that the proper communication be established with the public. 

Please feel free to contact ABEX and WatSec for more information on how you can effectively manage your cyber risks.

 


ABEX Proudly Supports Family and Children’s Services

christmas_ornamentABEX and its staff were proud to make another donation to Family and Children’s Services of the Waterloo Region before Christmas holidays.  

Last year, with ABEX’s and other donors’ help, Family and Children’s Services was able to provide special holiday support for over 700 families and youth in need in the Region through the Adopt-A-Family/Adopt-A-Youth Holiday program. 

In addition, over 250 families and youth benefited from the generous contributions to the Emergency Support fund.  What a fantastic demonstration of the spirit of the season!  As Waterloo Region continues to have a persistent poverty rate of 10-11%, it is hearth warming to know that our support truly makes a difference for the children, youth and families in the region!


Cyber Risks Basic Loss Control Techniques

Lock and network cableProtecting your business from cyber risks can be an overwhelming venture. With each passing month, new and more sophisticated viruses are being discovered, more spam is reaching your inbox and yet another well-known company becomes the victim of a data breach.

The world will never be free of cyber risks, but there are many loss control techniques you can implement to help protect your business from exposures.

1.     Install a firewall for your network.

Operating systems often come with pre-installed firewalls, but they are generally designed to protect just one computer. Examine the firewall’s options and select the best configuration to keep the computer safe.

If your business has a network of five or more computers, consider buying a network firewall. They can be pricey but network firewalls provide a fine level of coverage for an entire network.

2.     Install anti-virus, anti-malware and anti-spyware software.

This loss control technique is the easiest and most effective way to increase security at your business. Make sure to install the software on each computer in your network—computers that don’t include these types of software are much more likely to be exposed and can possibly spread malware to other computers in the network. There are a host of viable options for each type of software, ranging in price from free to an annual subscription. Be sure to keep the software as up-to-date as possible.

 3.     Encrypt data.

No firewall is perfect. If a hacker manages to get through your firewall and into your network, your data could be a sitting duck. Encryption will make the data unreadable to a hacker. Consider using an encryption program to keep computer drives, files and even email messages safe from hackers.  Read more >> 


ABEXAccess.com News: Initial Broker Rollout Starts Today!

ostrich ABEXAccess is a groundbreaking platform for rating and paperless policy issuance, that allows you to quote and issue insurance policies anytime, from anywhere and all in Real-Time! We are excited to be a part of the future of insurance. 

It’s official! 

ABEXAccess is in production starting today, December 16th, with an initial group of Brokers. The rollout will widen to a larger group of Brokers shortly after the Holiday Season in January.

Why is it awesome?

Get ready to receive quotations within minutes and policy issuance with lightning speed! For the first time ever brokers will have the capability to quote and issue full policy documents in real-time.

What products are available?

The first insurance products that will be available through ABEXAccess include our Comprehensive Rental and Off Campus Housing package policies. Other products will follow, including Home Owners, Rental, Builders Risk, and more! 

Want to learn more? 

This is a major milestone achievement and we are thrilled to offer you and your clients a superior experience with ABEXAccess.  

Please click on the links below to learn more about this revolutionary solution for Real-Time rating and paperless policy issuance.

If you are interested in using ABEXAccess early in our rollout to all the Brokers, please contact us at quotes@abexinsurance.com.


Blog

FOLLOW OUR BLOG

Receive notifications of new posts automatically.



ABEX - AFFILIATED BROKERS EXCHANGE IS ON FACEBOOK.

Like us on Facebook

Connect with us on LinkedIn