Home Depot Struck by Same Malware that Rocked Target

By Matt Paulson September 09, 2014

Late last year, Target was struck by a devastating malware attack that released the personal information of millions of customers including names, addresses and credit card numbers. Now, it appears the same software was used in another attack launched against Home Depot last Tuesday.

Last year's attack on Target exploited security vulnerabilities on the company's point-of-sale (POS) systems, where the retail transactions take place. A malware strain known as “BlackPOS” was able to copy and transmit customer data as the transaction was taking place, and this same software was found within Home Depot's cash registers.

RedSeal Networks, a leading provider of end-to-end network visibility and cyberattack prevention analytics claims that this attack is part of a rising trend. “The similarity of the Home Depot breach to the Target breach is a useful object lesson in how security works nowadays,” said the company's CTO Dr. Mike Lloyd. “Similar to any criminal investigation, it's worth thinking about motive, means and opportunity.”

“Motive hasn't changed much – it's easy to see why some people would steal money, when it's easy enough. Means do change – automated tools are continuously being developed, and largely automated” continued Lloyd.

 This means that when an attack works once, it's likely to work again, and automation allows attackers to sit back and have computers hunt down any other victims who are vulnerable in the same way. And as for the opportunity, the problem there is that our defenses are generally weak. The fact that the same exploit worked at both Target and Home Depot is a reminder of the IT mono-culture, and the serious perils of under-investment in defensive security automation.

By increasing variety in the way POS systems work, businesses will not have to live in fear of BlackPOS attacks. Unfortunately, the current security systems climate is rather homogenous, which increases the effectiveness of repeat attacks like this one.




Edited by Maurice Nagle

TechZone360 Contributing Writer

SHARE THIS ARTICLE
Related Articles

Bloomberg BETA: Models Are Key to Machine Intelligence

By: Paula Bernier    4/19/2018

James Cham, partner at seed fund Bloomberg BETA, was at Cisco Collaboration Summit today talking about the importance of models to the future of machi…

Read More

Get Smart About Influencer Attribution in a Blockchain World

By: Maurice Nagle    4/16/2018

The retail value chain is in for a blockchain-enabled overhaul, with smarter relationships, delivering enhanced transparency across an environment of …

Read More

Facebook Flip-Flopping on GDPR

By: Maurice Nagle    4/12/2018

With GDPR on the horizon, Zuckerberg in Congress testifying and Facebook users questioning loyalty, change is coming. What that change will look like,…

Read More

The Next Phase of Flash Storage and the Mid-Sized Business

By: Joanna Fanuko    4/11/2018

Organizations amass profuse amounts of data these days, ranging from website traffic metrics to online customer surveys. Collectively, AI, IoT and eve…

Read More

Satellite Imaging - Petabytes of Developer, Business Opportunities

By: Doug Mohney    4/11/2018

Hollywood has programmed society into believing satellite imaging as a magic, all-seeing tool, but the real trick is in analysis. Numerous firms are f…

Read More