U.S. is investigating Target data breach, AG Holder says
Department of Justice, usually mum about live investigations, veered from its protocol in Target case
IDG News Service - The U.S. Department of Justice is investigating the data breach at Target stores, which compromised as many as 110 million payment cards and personal records in one of the largest such attacks on record.
Attorney General Eric Holder told the U.S. Senate Judiciary Committee on Wednesday that "we are committed to working to find not only the perpetrators of these sorts of data breaches -- but also any individuals and groups who exploit that data via credit card fraud."
The DOJ veered from its normal protocol in revealing its probe. Holder said the DOJ generally does not discuss matters under investigation but did not say why it made an exception in this case. The U.S. Secret Service is also investigating, and other cyberdefense organizations in the U.S. government are contributing.
Target disclosed earlier this month that its payment networks were infected with malicious software that stole payment card details. Luxury retailer Neiman Marcus reported a similar attack.
Michaels, an arts and crafts chain, said on Saturday it was alerting customers after possible unauthorized charges were discovered from cards used at its stores. The company said it is investigating whether a breach occurred.
The Target data breach has led computer security experts to study the economy around stolen card data. It is suspected that many more retailers may have been compromised, with attackers focusing on point-of-sale devices.
The malware used against Target was a "RAM scraper," which intercepted unencrypted payment card data on the POS device. It is unknown how intruders gained access to Target's network, but it appears they gained wide leverage, taking more than 11GB of data.
Send news tips and comments to email@example.com. Follow me on Twitter: @jeremy_kirk
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Streamline Data Protection with IBM Tivoli Storage Manager Operations Center IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup...
- Simplify and Consolidate Data Protection for Better Business Results Learn about IBM® Tivoli® Storage Manager Operations Center, which provides advanced visualization, built-in analytics and integrated workflow automation features that leapfrog traditional backup...
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,... All Cybercrime and Hacking White Papers | Webcasts