Target1

TARGET case

  • The first day of the attack

  • The last day of the attack

  • the attack was known

  • TARGET confirmed a beach of 40 millions stolen accounts

    The type of data stolen — also known as “track data” — allows crooks to create counterfeit cards by encoding the information onto any card with a magnetic stripe. If the thieves also were able to intercept PIN data for debit transactions, they would theoretically be able to reproduce stolen debit cards and use them to withdraw cash from ATMs.
    source from krebsonSecurity
  • Stolen cards appear in black market

    Stolen cards appear in black market
    tracking the black market Barbarossa base list the country of origin for the issuing bank, and then the state, city and ZIP code of the Target store from which the card numbers were stolen. This feature is included because it allows customers of the shop to buy cards issued to cardholders that live nearby. Avoiding transaction occur outside the legitimate geographical areas.
  • Brian Krebs is chasing the mysterious nickname "Rescator"

  • TARGET stated that all PIN numbers were encrypted

  • 2 russians found to be the coder of the malware

  • TARGET breach used stolen vendor access CREDENTIALS

  • TARGET may face Federal Charges

    TARGET has been communicating with FTC