Target Breach Case Study

Improved Essays
Our group decided to discuss the Target breach. This breach occurred in 2013 when they stated hackers broke into the retailer’s network using login credentials stolen from a heating, ventilation and air conditioning company that does work for Target at a number of locations. This company called Fazio had access rights to Target’s network for carrying out tasks like remotely monitoring energy consumption and temperatures at various stores. The attackers leveraged the access provided by the Fazio credentials to move around undetected on Target’s network and upload malware programs on the company’s point of sale systems. The hackers first tested the date-stealing malware on a small number of cash registers. After they noticed it worked and it went through they uploaded it to majority of Target’s POS systems. During November 27th to December 15th 2013, the attackers used the malware to steal data on about 40 million debit and credit cards, 70 million addresses, phone numbers, and other pieces of personal information. This is one of the busiest times of the year with two major holidays and so many people are shopping …show more content…
Target had a team of security specialist in Bangalore to monitor its computers 24/7. Now the security operation center was located in Minneapolis. On November 30th Fire eye spotted the hackers. Bangalore got an alert and the Minneapolis team was flagged but nothing happened. Minneapolis did not take action on the alarms. Our group feels if an alert is generated that there's an intrusion, it shouldn't have been handled by email or a ticketing system. It should have resulted in a phone call to the on-call person, if necessary and a conference bridge until the event was diagnosed and acted upon. If it was acted up on immediately it could have been avoided or less amount of confidential information would have not been

Related Documents

  • Great Essays

    Attack Timeline, Target’s Perspective Date 1: November 15, 2013 – Cybercriminals conduct attack on HVAC systems. Criminals penetrated Target’s point of sale network and installed malware on terminals. Date 2: November 27, 2013 (12 days after Date 1) – Cybercriminals begin stealing information from 40 million debit/credit cards from Target’s systems. *Last known attack from cyber criminals* Date 3: November 30, 2013 (15 days after Date 1) – Target acknowledges publicly that FireEye had been giving more alerts but local teams deemed that no action had to be taken against the alerts so Target did nothing. Date 4: December 13, 2013 (28 days after Date 1) – U.S. Department of Justice notifies Target executives about fraudulent debit/credit information connected to Target transactions.…

    • 591 Words
    • 3 Pages
    Great Essays
  • Decent Essays

    Target received red flags right before the actual attack. Due to common cyber crimes target was already aware of the threats that happen so they installed $1.6 million malware detection tool Fireeye. They also had a team of security specialists in Bangalore and Minneapolis who monitor its computers around the clock. Fire eye did its job and notified them on multiple occasions about the incident that’s going to happen; unfortunately security team appears to have made wrong call. "…

    • 332 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    This author himself is a highly educated, college professor. Even with that perspective of being a scholar in this field of study for more than 5 years, Herb does not frame this article to be viewed by other highly educated university professors in his similar field of study. As I mentioned before he aims this article at a more general population. The actual audience of this piece would be subscribers to the Washington Post where this article was published. In addition to the subscribers, the ideal audience would include individuals in care about the Equifax hack or cyber space policy and security.…

    • 1616 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Data breaches caused by illegal hacking at Target were in themselves tragedies and worrisome events; not only for the company, but for the customers in general who shop at the store locations nation-wide. However, considering various steps taken by Target upon realization of the breaches, it is hard to defend or picture exact wrongful doings or violation of laws by Target. Let’s keep in mind that electronic data and information breaches are hard to prevent; this is mostly due to interconnectivities of globally devices. As such, laws do not persecute companies for hackers breaking into their networks; instead, there are laws binding companies to put required secure methods and practices in place to mitigate hacking or data thefts; also, once a breach is noticed, laws require that such incident be reported immediately and those affected be notified. Here's what happened after; "Target alerted authorities and financial institutions immediately after we discovered and confirmed the unauthorized access, and we are putting our full resources behind these efforts.…

    • 567 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Another even that occurred in 2013 is the now infamous data breach. This incident threatened the future trust of Target’s core consumers. The criminals hacked into Target systems gaining access to customers debit and credit card information endangered Target’s standing amongst even its most loyal guests. Following the breach, Target experienced weaker than expected sales immediately following the announcement of this data breach that occurred in the fourth quarter of 2013 that can be seen from the negative percentage sales growth line item (10-K 5). Fiscal 2015 included the following notable items: Target sold their pharmacy and clinic business to CVS, recognizing a pretax gain of $620 million.…

    • 176 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Target Executive Summary

    • 433 Words
    • 2 Pages

    Target's supply chain metamorphosis brought other changes like actually restructured store's shelves to…

    • 433 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Target Case

    • 399 Words
    • 2 Pages

    To date they have approximately 1800 throughout the United States (kinicki & Williams, 2016 p.38). Another standard method,is they have welcomed domestic designers to provide more affordable products for their customers (Design & innovation, n.d.). After the misfortune of the cyberattack, Target began upgrading their database and invested in the credit card technology for added security (Kinicki & Williams, 2016 p.37). Next when confronting the issue of diversity Target has partnered and sponsored a number of groups and affiliations of different ethnic and cultural groups. The have even adopted outreach efforts to provide to the community around them.…

    • 399 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    According to a report by USA Today’s Elizabeth Weise, an astounding 43% of businesses had been hacked in 2014 and they don’t seem to be slowing down (Weise, 2014). It is important to expand further on the Target store breach of 2013.…

    • 946 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Target appropriately handled this crisis because the CEO, Gregg Steinhafel, released a newsletter on Targets website apologizing to the public, which showed that Target took full responsibility for the events that occurred. In the newsletter, Steinhafel states “It was a crime against Target, our team members, and most importantly you- our valued guest” (Steinhafel, 2013). He goes on to confirm that the data breach issue has been addressed and shopping at Target is safe and secure. Target then guarantees guest that they will not be held financially responsible for any credit and debit card fraud. Target even offered a free credit monitoring service for all of its impacted customers.…

    • 313 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Target Executive Summary

    • 508 Words
    • 3 Pages

    At the current moment Target is aggressively promoting its grocery department and had expanded to markets in Canada, but in early 2015 it had decided to cease its operations in Canada. (Hoovers, Inc., 2015) Competitive Landscape Target is in a crowded field because of their large product line up. Since Target offers a large selection of products they compete with all sorts of companies such as toy stores, pharmacies, grocery stores, and home furnishing stores. Having a large product catalog means the company competes with vendors such as, Kohl’s, CVS, Best Buy, Costco, and many more. Targets’ top competitors include, Amazon,…

    • 508 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Sometimes when we’re placed in difficult situations, we make irrational decisions out of desperation. Target is currently in a situation as to where it needs to remain competitive in the online market and is putting pressure on its vendors to oblige to their request. Whereas this may not seem like a big deal to some, it fringes on possibly engaging in unethical behavior.…

    • 229 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Target Breach Essay

    • 1427 Words
    • 6 Pages

    Target could have truly prevented this attack from happening. However, due to negligence on the company's behalf, the network upgrade was tabled and the consumers suffered that decision. The Target Corporation failed to be good stewards over the consumer's trust, and causing the consumer's sensitive information to be compromised. In hindsight, had the security systems been the top priority the data breach may have been avoided.…

    • 1427 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Target Breach

    • 1769 Words
    • 8 Pages

    I believe this was the best move for the company. They could not inform the public before they fixed the problem. Target also released multiple press releases following the incident to keep customers informed on the hack. I believe Target informed the customer’s in a timely manner, but could have done it in a better way. They emailed the customers in regards to the data breech, but so were spammers and other hackers.…

    • 1769 Words
    • 8 Pages
    Improved Essays
  • Great Essays

    Data Breaches In Research

    • 1346 Words
    • 6 Pages

    Types of data breaches Safeguarding and securing information is an important aspect of business that allows for preventing and minimizing risks. With data breach or incidents in which information is compromised, both businesses and consumers are greatly impacted, due to adverse consequences that may follow. The globalization of today’s economy is dependent upon electronic access via the internet, email, and “other components of “cyberspace,” including the global consumer credit card payment networks. Different types of informational or data breaches that significantly affect business functions involve compromise of financial data, customer’s private information, and business proprietary data. Data breaches totaled 1,540 worldwide in 2014…

    • 1346 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    I conclude that the overall results of the total data records breached means that if more than one organization has all our sensitive information such as our full names, social security numbers, date of birth, credit card numbers, and etc. then we are more likely have a higher risk of getting exposed more than once if the organization’s database is maliciously attacked. To continually increase awareness in data breach protection best practices will help Businesses and other organizations to lower the risk and minimize the impact of data breach in the future as technology continues…

    • 952 Words
    • 4 Pages
    Improved Essays