MINNEAPOLIS, Jan. 17 (UPI) -- The hack compromising millions of Target customers in the United States occurred in two distinct phases, a Silicon Valley data security company said.
"First, the malware that infected Target's checkout counters [point of sale] extracted credit numbers and sensitive personal details," Seculert's research lab officials posted Thursday in a blog after running a sample of the malware. "Then, after staying undetected for six days, the malware started transmitting the stolen data to an external FTP [file transfer protocol] server, using another infected machine within the Target network."