- T.I. says Nipsey Hussle’s death was ‘like losing Iron Man’ while advocating for underprivileged communities 5 Years Ago
- Facebook banned billions of fake accounts in the first 3 months of this year 5 Years Ago
- Twitch streamer gets banned for drunkenly passing out during broadcast Today 5:00 PM
- WikiLeaks’ Julian Assange indicted under Espionage Act Today 4:39 PM
- These doctored videos want to make you think Nancy Pelosi is always drunk Today 4:02 PM
- A robot could soon be delivering your packages from a self-driving car Today 3:29 PM
- Bipartisan anti-robocall bill overwhelmingly passes Senate Today 2:40 PM
- Deepfake-style videos can now be made with just a single image Today 1:57 PM
- The Lonely Island’s ‘Bash Brothers’ is what Netflix should be doing with short-form comedy Today 1:55 PM
- ‘Green dress lady’ proves green screen memes are still going strong Today 1:45 PM
- ‘Bowling alley strike screen’ memes are bizarre and wonderful Today 12:40 PM
- TikTok star Mohit Mor shot and killed Today 12:00 PM
- Stephen A. Smith is baby Today 11:43 AM
- Tfue releases statement on FaZe Clan lawsuit, says his contract is ‘f*cked’ Today 11:34 AM
- People are using an app to out gropers on Japan’s subway Today 11:24 AM
A phony program known as Trojan.POSRAM is to blame for Target’s data breach in December.
Blame that massive Target hack on the 21st century’s Trojan horse.
A phony program known as Trojan.POSRAM is to blame for a data hack making public the personal information for upwards of 70 million Target shoppers in December, a heist that extracted everything from names and phone numbers to mailing addresses and personal emails.
According to iSight Partners, a cyber intelligence company that read an internal report produced by the U.S. Secret Service, the code came to bear from a similarly effective bug known as BlackPOS, developed last year in Russia, and a few “other malicious tools to penetrate networks.” Those additional tools made Trojan.POSRAM more advanced: The program’s technology allowed it complete ambiguity among antivirus programs.
Once in, the program monitored and subsequently siphoned data stored on Target’s system through a series of memory extractions on payment application programs. iSight cybercrime analyst Jayce Nichols said the individual components of the entire program aren’t exactly highly sophisticated, but its overall composition is.
“While some components of the breach operation were technically sophisticated,” iSight writes in its own report about the malware, “the operational sophistication of the compromise activity makes this case stand out. The intrusion operators displayed innovation and a high degree of skill in orchestrating the various components of the activity.”
Photo via Mr. T in DC/Flickr
Chase Hoffberger reported on YouTube, web culture, and crime for the Daily Dot until 2013, when he joined the Austin Chronicle. Until late 2018, he served as that paper’s news editor and reported on criminal justice and politics.