Target Attack Research Paper

Great Essays
Target Attacker Timeline
Date 1: 10/8/2013. (Estimated date)
Reconnaissance and scanning: Attackers acquired Fazio Mechanical Firm’s user code and password through a phishing email containing a Trojan called Citadel, a password sniffing bot program. The phished credentials provided access to Target’s payment system network. Extensive reconnaissance and scanning would have been needed in order to identify Fazio Mechanical as a Target vendor, and acquire the emails of employees that possessed the login credentials necessary to access Target’s systems.
Date 2: November 11th 2013 (Around 34 days after date 1)
Exploitation: Attackers first breach Target’s system. Accessed remotely by utilizing phished credentials to masquerade as a vendor.
Date
…show more content…
Attack Timeline, Target’s Perspective
Date 1: November 15, 2013 – Cybercriminals conduct attack on HVAC systems. Criminals penetrated Target’s point of sale network and installed malware on terminals.
Date 2: November 27, 2013 (12 days after Date 1) – Cybercriminals begin stealing information from 40 million debit/credit cards from Target’s systems. *Last known attack from cyber criminals*
Date 3: November 30, 2013 (15 days after Date 1) – Target acknowledges publicly that FireEye had been giving more alerts but local teams deemed that no action had to be taken against the alerts so Target did nothing.
Date 4: December 13, 2013 (28 days after Date 1) – U.S. Department of Justice notifies Target executives about fraudulent debit/credit information connected to Target transactions. Target quickly removed the malware that was being utilized by the cybercriminals
Date 5: December 19, 2013 (34 days after Date 1) – Target officially announces attack and the theft of debit/credit information. Target also launched a major public relations operation to assure their customers that the technology used by the attackers had been found and

Related Documents

  • Improved Essays

    Nt1310 Unit 3 Term Paper

    • 621 Words
    • 3 Pages

    Security Ecommerce site Phishing, “brand spoofing” or “carding”, is not a “pass-time” process but is a business-like on which organized crime groups extensively use and make a big deal of money. Phishing, being one of the most security challenges, is a hacking technique of malicious and fraudulent mass mailing, masquerade as emails from government agencies, business partners or even company executives using modern way such as social media, phone calls and any other communications to get access to usernames and passwords, credit cards or other sensitive information to steal valuable data. According to Anti-Phishing Working Group (APWG), an increase of 86% of phishing attacks in companies from 2013 to 2015 has been analyzed (source: Forbes).…

    • 621 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Target received red flags right before the actual attack. Due to common cyber crimes target was already aware of the threats that happen so they installed $1.6 million malware detection tool Fireeye. They also had a team of security specialists in Bangalore and Minneapolis who monitor its computers around the clock. Fire eye did its job and notified them on multiple occasions about the incident that’s going to happen; unfortunately security team appears to have made wrong call. "…

    • 332 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Well before the breach on Target, the company had already been receiving alerts. Evidently, the company’s million-dollar investment of FireEye’s did what it was supposed to do by alerting Target on numerous occasions (Riley, M., Elgin, B., Lawrence, D.). The worst part about this attack was that it was done by “script kiddies”, which is a person who basically uses other people’s scripts and codes to hack into computers. Overall Target had what they needed as far as security tools to keep this from happening, but an employee didn’t do what was necessary. It could very well be that the staff was not properly trained on roles and responsibility; this in turn led to the passivity of the alerts that were sent.…

    • 216 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Target Breach Case Study

    • 675 Words
    • 3 Pages

    Our group decided to discuss the Target breach. This breach occurred in 2013 when they stated hackers broke into the retailer’s network using login credentials stolen from a heating, ventilation and air conditioning company that does work for Target at a number of locations. This company called Fazio had access rights to Target’s network for carrying out tasks like remotely monitoring energy consumption and temperatures at various stores. The attackers leveraged the access provided by the Fazio credentials to move around undetected on Target’s network and upload malware programs on the company’s point of sale systems. The hackers first tested the date-stealing malware on a small number of cash registers.…

    • 675 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Another even that occurred in 2013 is the now infamous data breach. This incident threatened the future trust of Target’s core consumers. The criminals hacked into Target systems gaining access to customers debit and credit card information endangered Target’s standing amongst even its most loyal guests. Following the breach, Target experienced weaker than expected sales immediately following the announcement of this data breach that occurred in the fourth quarter of 2013 that can be seen from the negative percentage sales growth line item (10-K 5). Fiscal 2015 included the following notable items: Target sold their pharmacy and clinic business to CVS, recognizing a pretax gain of $620 million.…

    • 176 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    This information was further used by the attackers to enter the “Weaponization”phase to execute a phishing campaignagainst thisexternal vendorbymeans…

    • 892 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    After reading the article what I summarize that Target's Database was hacked. The hackers used the information from the database to steal people’s information and money. This caused Target a problem between the customers and company. Target had to offer $10,000,000 to fix the issue, and paid each customer who were victims would receive up $10,000. This caused Target to close all the of their stores in Canada, and lay off about 34,000 employees.…

    • 180 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Target appropriately handled this crisis because the CEO, Gregg Steinhafel, released a newsletter on Targets website apologizing to the public, which showed that Target took full responsibility for the events that occurred. In the newsletter, Steinhafel states “It was a crime against Target, our team members, and most importantly you- our valued guest” (Steinhafel, 2013). He goes on to confirm that the data breach issue has been addressed and shopping at Target is safe and secure. Target then guarantees guest that they will not be held financially responsible for any credit and debit card fraud. Target even offered a free credit monitoring service for all of its impacted customers.…

    • 313 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Target Breach

    • 1769 Words
    • 8 Pages

    Most people can remember the Target breach, whether they were affected by it or not. Personally, this was the first big data breach that I remember, and I was one of the millions affected by it. While I do not shop at Target often of course I bought one thing from the store during the time of the breach. I was a nervous wreck, my wife was even worse. Luckily the only thing affected was our nerves and not our personal identities.…

    • 1769 Words
    • 8 Pages
    Improved Essays
  • Superior Essays

    Great Depression and The Stock Market Crash The Great Depression peaked in 1932. It got so bad, that over 6,000 people walked the streets in New York City trying to sell apples for 5 cents each. When the stock market crashed in 1929, it took until 1954 for the stock market to return to pre-depression.…

    • 961 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Technology has shaped many parts of our lifestyle’s from movement from one point to another (GPS), all the way to maintaining all of our hard earned funds on a piece of plastic. The question at hand is how this is all protected and who enforces it? Network security has proven beneficial in many cases in today’s society. It continuously monitors the companies system ensuring that unauthorized access isn’t permitted, or as we like to believe keeping our information from falling into the wrong hands.…

    • 397 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Target Breach Case Study

    • 740 Words
    • 3 Pages

    Missed Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It 1. Who are the stakeholders in the Target breach? The main stakeholders are their shareholders, the clients that had their personal information stolen, and individuals with an ongoing connection with Target organization whose personal information was or might have been compromised. Stakeholders who are affected or worried that they might be harmed start to mistrust the firm and its complacent-sounding promises.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    One psychograph that I will be targeting are people involved in non-profits and organizations that advocate for peace. My film, The Peacemaker, would be of interest to these groups of people since Padraig O’Malley travels all over the world to help create peace in crisis zones. Although these organizations may approach creating peace differently or work for other causes, they are all similar to Padraig’s mission in that they are simply trying to make the world a better place. These people are classified as “self-actualizers” since they explore change and focus on people in a way that they enthusiastically work towards making life better for others. Specifically, the groups I am targeting are all based in Orlando so that they will be able…

    • 379 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Ackman Case Study Summary

    • 960 Words
    • 4 Pages

    In the summer of 2007, William Ackman Attained 9.6% of Target’s outstanding shares. As an activist shareholder, William Ackman had a goal to work with Target’s management and bring up their share price while also working to get on the board of directors. There were three critical changes Ackman wanted to bring about Target’s operations: selling Target 's credit card business, increasing its stock buyback program, and selling a portion of their real estate holdings. With those three changes, Ackman believed from his past experiences, he could help Target increase their valuation.…

    • 960 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Shane Harris in his book @War: The Rise of the Internet-Military Complex (2015) explains that the government is partnering with large technology companies in order to carry out espionage and digital attacks that have real world consequences. Harris supports his claims by describing the operations and programs the US engaged in alongside private technology companies based on public knowledge and on interviews conducted with top US officials. The author’s purpose is to inform the audience about the potential dangers of cyberwar and how the government is deeply involved in cyberspace, both defensively and offensively, so that the reader understands the potent risks we face in a digital world and can decide whether or not the government’s involvement…

    • 2196 Words
    • 9 Pages
    Great Essays