The Clinton Herald, Clinton, Iowa

Community News Network

January 17, 2014

Hackers probably attacked companies beyond Target, report says

(Continued)

WASHINGTON —

According to the iSIGHT analysis, the software infects POS terminals, sends out the stolen information, then covers its tracks by automatically deleting those files.

The difficulty of detecting and tracing the attacks is what makes them so dangerous and has allowed hackers to breach multiple retailers over the last several months, according to the report.

The malicious software, named for a Russian word that appears several times in the code, was sold in black-market web forums starting last summer and was customized by hackers to fit specific victims, making attacks more effective, iSIGHT's Watters said.

The attacks show how cybercriminals are outpacing the ability of companies to respond, Watters said.

— With assistance from Cotten Timberlake in Washington and Renee Dudley in New York.

Text Only
Community News Network
Front page
Clinton Herald Photos


Browse, buy and submit pictures with our photo site.

Poll

What are your plans for the weekend?

Enjoying the outdoors
Staying in out of the heat
Traveling
Other
     View Results
AP Video
Olympics 2014
Featured Comment
Featured Ads
Blue Zones Project
Parade
Magazine

Click HERE to read all your Parade favorites including Hollywood Wire, Celebrity interviews and photo galleries, Food recipes and cooking tips, Games and lots more.