Advertisement

Data security firm says Target customers victims of two-stage attack

Shoppers leave a Target store in the early morning hours on November 26, 2010 in Waukesha, Wisconsin. UPI/Brian Kersey
Shoppers leave a Target store in the early morning hours on November 26, 2010 in Waukesha, Wisconsin. UPI/Brian Kersey | License Photo

MINNEAPOLIS, Jan. 17 (UPI) -- The hack compromising millions of Target customers in the United States occurred in two distinct phases, a Silicon Valley data security company said.

"First, the malware that infected Target's checkout counters [point of sale] extracted credit numbers and sensitive personal details," Seculert's research lab officials posted Thursday in a blog after running a sample of the malware. "Then, after staying undetected for six days, the malware started transmitting the stolen data to an external FTP [file transfer protocol] server, using another infected machine within the Target network."

Advertisement

The transmissions occurred during a two-week period beginning Dec. 2, the blog said.

Seculert, based in Menlo Park, Calif., said none of the stolen Target data was still on the external server and an analysis of publicly available access logs indicates Target was the only retailer affected.

Minneapolis-based Target first revealed the data breach in December during the height of the holiday shopping season. It first said debit card and credit card data from up to 40 million customers were compromised -- then on Jan. 10 said a separate attack stole data from up to 70 million more customers.

Advertisement

Latest Headlines

Advertisement

Trending Stories

Advertisement

Follow Us

Advertisement