A security firm has identified two Russians as the creators of the malware behind the attack on Target that netted personal information on as many as 110 million Target customers. But the firm has also said that the attack, and possibly additional attacks, appears to have been carried out by others.
IntelCrawler, a security firm headquartered in Sherman Oaks, Calif., issued a statement on Friday that the identified BlackPOS malware may have also been used against as many as six other retailers. Recent news reports indicate that retailer Neiman Marcus has also suffered a security breach, and the U.S. Department of Homeland Security has warned about similar attacks targeting individual point-of-sale terminals.
On Thursday, security company iSIGHT Partners, working with the U.S. Secret Service, announced it has determined that a new malicious software, called KAPTOXA and pronounced Kar-Toe-Sha, "has potentially infected a large number of retail information systems."
In a joint statement by Homeland Security, the Secret Service, the Financial Services Information Sharing and Analysis Center (FS-ISAC) and iSIGHT Partners, the organizations said that any company or institution with a point-of-sale system "may be at risk." A copy of the report is available from iSIGHT Partners.
On Friday, researchers at IntelCrawler first said the age of the BlackPOS malware author was about 17, that he often employs the username "ree4," and that he is based in St. Petersburg. The teen, whom they identified as Sergey Tarasov, is allegedly known in the underground as a prolific creator of malware.
The company also said it had determined that BlackPOS was first developed in March of last year, and that its original name was Kaptoxa, Russian slang for a potato. The security firm said more than 40 builds of the malware have been sold for about $2,000 each to cybercriminals in Eastern Europe and other countries, including underground shops that sell hacked credit cards.
Shibaev and Tarasov
Following its initial fingering of Tarasov, IntelCrawler subsequently revised its identification of ree4 as being Rinat Shibaev, who they said worked closely with "his technical support" Tarasov.
The revision came after Internet security blogger Brian Krebs, an ex-reporter for the Washington Post who was instrumental in bringing the Target hack to light, raised questions about whether IntelCrawler had correctly identified the person behind the software.
IntelCrawler has said that, while the two identified Russians appear to have created the software, the actual attack was carried out by some of their customers, who purchased the malware.
According to IntelCrawler, the attackers were able to plant their BlackPOS malware because the retailers' terminals used default passwords that could readily be guessed.
The economic impact of these security breaches at the retailers could be huge, according to some analysts, because these thefts of vast amounts of personal data could result in a tidal wave of class-action lawsuits, in addition to the actual theft resulting from the thieves' use of the information.
Posted: 2014-01-22 @ 11:04am PT
They deserve the tidal wave of class-action lawsuits for leaving default passwords. The lawsuits should also target device manufacturers who could, with a little bit of foresight, not equip their devices with default passwords and instead generate a random one for the user on first time installation of the device.