- Kylie Jenner found a way to make Kobe Bryant’s death about her 6 Years Ago
- Warren calls for harsh penalties for tech companies that spread voter disinformation 6 Years Ago
- ‘Vanderpump Rules’ recap: Miami vices and vexes 6 Years Ago
- Teen gets harmonica stuck in mouth, documents it on TikTok Today 11:08 AM
- Joey Salads got his DNA results in and now he’s tweeting the N-word Today 10:58 AM
- NikkieTutorials says she knows who blackmailed her Today 10:22 AM
- Seth Rogen is making a movie about a deadly meme Today 9:30 AM
- Ring should be shut down ‘immediately,’ Amazon engineer warns Today 9:19 AM
- Joe Biden wants his own Bernie Bros Today 8:57 AM
- Twitch star Adept shares heartwarming story about meeting Kobe Bryant Today 8:44 AM
- ‘Promising Young Woman’ unravels the complexities of a revenge fantasy Today 8:35 AM
- Review: ‘Next in Fashion’ is Netflix’s latest attempt at reality TV Today 7:00 AM
- What is Byte, and can it really compete with TikTok? Today 7:00 AM
- Migrants are under social media surveillance—and that’s a problem for everyone Today 6:00 AM
- Gabrielle Union deserves better from Terry Crews Tuesday 11:12 PM
The Trojan horse that ruined Christmas for Target
A phony program known as Trojan.POSRAM is to blame for Target’s data breach in December.
Blame that massive Target hack on the 21st century’s Trojan horse.
A phony program known as Trojan.POSRAM is to blame for a data hack making public the personal information for upwards of 70 million Target shoppers in December, a heist that extracted everything from names and phone numbers to mailing addresses and personal emails.
According to iSight Partners, a cyber intelligence company that read an internal report produced by the U.S. Secret Service, the code came to bear from a similarly effective bug known as BlackPOS, developed last year in Russia, and a few “other malicious tools to penetrate networks.” Those additional tools made Trojan.POSRAM more advanced: The program’s technology allowed it complete ambiguity among antivirus programs.
Once in, the program monitored and subsequently siphoned data stored on Target’s system through a series of memory extractions on payment application programs. iSight cybercrime analyst Jayce Nichols said the individual components of the entire program aren’t exactly highly sophisticated, but its overall composition is.
“While some components of the breach operation were technically sophisticated,” iSight writes in its own report about the malware, “the operational sophistication of the compromise activity makes this case stand out. The intrusion operators displayed innovation and a high degree of skill in orchestrating the various components of the activity.”
Photo via Mr. T in DC/Flickr
Chase Hoffberger reported on YouTube, web culture, and crime for the Daily Dot until 2013, when he joined the Austin Chronicle. Until late 2018, he served as that paper’s news editor and reported on criminal justice and politics.