6 More Stores Attacked By Same Hack As Target: Firm

It Gets Worse...
|
Open Image Modal
MIAMI, FL - DECEMBER 19: A Target store is seen on December 19, 2013 in Miami, Florida. Target announced that about 40 million credit and debit card accounts of customers who made purchases by swiping their cards at terminals in its U.S. stores between November 27 and December 15 may have been stolen. (Photo by Joe Raedle/Getty Images)

BOSTON (Reuters) - A cybercrime firm says it has uncovered at least six ongoing attacks at U.S. merchants whose credit card processing systems are infected with the same type of malicious software used to steal data from Target Corp.

Andrew Komarov, chief executive of the cybersecurity firm IntelCrawler, told Reuters that his company has alerted law enforcement, Visa Inc and intelligence teams at several large banks about the findings. He said payment card data was stolen in the attacks, though he didn't know how much.

IntelCrawler's findings are the latest sign that the cyberattacks disclosed by Target Inc and upscale department store Neiman Marcus are part of a wider assault on U.S. retailer customer data security.

On Thursday, the U.S. government and the private security intelligence firm iSIGHT Partners warned merchants and financial services firms that the BlackPOS software used against No. 3 U.S. retailer Target had been used in a string of breaches at retailers - but did not say how many or identify the victims. Government officials declined to discuss current investigations.

Komarov, an expert on cybercrime who has helped law enforcement investigate previous attacks, told Reuters on Friday that retailers in California and New York were among those compromised by BlackPOS. Reuters was unable to confirm the retailers' names.

Komarov said he has not directly contacted those merchants. Security experts typically report cybercrimes through law enforcement rather than going directly to victims because the process can be time-consuming and victims are often suspicious when they first learn of attacks.

BlackPOS was developed by a hacker whose nickname is "Ree4" and who is now about 17 years old and living in St. Petersburg, Russia, according to Los Angeles-based IntelCrawler.

The teenager sold the malicious software to cybercriminals who then launched attacks on merchants, said Komarov, who has been monitoring Ree4's activities since March.

Komarov declined to specifically identify the sources of his intelligence, though he said he has been monitoring criminal forums where Ree4 sells his software and posted an excerpt of a chat with a client on the IntelCrawler website.

Officials with the Russian Interior Ministry could not be reached for comment when Reuters attempted to contact them after office hours on Friday.

The bulk of the attacks have occurred in the United States, but about 30 percent have occurred in other countries, including Australia and Canada, Komarov said.

Target last month disclosed the theft of some 40 million payment card numbers in a breach uncovered over the holiday shopping season, and later reported that 70 million customers' records had also been taken.

Neiman Marcus last week said that it too was victim of a cyberattack. Sources have told Reuters that at least three other well-known national retailers have been attacked..

John Watters, chief executive of iSIGHT Partners, which is helping the U.S. Secret Service with its investigation into the attacks, said that he expects the pace of assaults on merchants to pick up.

Copycats will pile on, using similar software, which can be purchased on underground forums, and similar techniques to launch attacks on retailers, he said. "They are saying: 'This is a great idea.'"

BlackPOS is a type of RAM scraper, or memory-parsing software, which enables cybercriminals to grab encrypted data by capturing it when it travels through the live memory of a computer, where it appears in plain text.

It is derived from code that has been floating around underground cybercrime forums since at least 2005 and may be related to malicious software used in attacks as early as 2003, said Shane Shook, an executive with cybersecurity firm Cylance Inc who has helped investigate major breaches at retailers.

While the technology has been around for many years, its use has increased as retailers have improved their security, making it more difficult for hackers to obtain credit card data using other approaches.

It succeeded in evading detection by anti-virus software when it infected the Windows-based point-of-sales terminals at retailers like Target, according to the report that the government privately distributed to merchants on Thursday, which iSIGHT Partners helped prepare.

A spokeswoman for Visa said she could not immediately comment on the report of ongoing cyberattacks but noted that consumers should not be concerned about incurring losses from payment card fraud.

"For consumers, I would point to zero liability. They are protected," spokeswoman Rosetta Jones said in an email.

Officials with the Secret Service could not immediately be reached for comment.

(Additional reporting by Richard Valdmanis, Lisa Baertlein, Mark Hosenball, David Henry and Megan Davis; Editing by Richard Valdmanis, Chizu Nomiyama and Jonathan Oatis)

Our 2024 Coverage Needs You

As Americans head to the polls in 2024, the very future of our country is at stake. At HuffPost, we believe that a free press is critical to creating well-informed voters. That's why our journalism is free for everyone, even though other newsrooms retreat behind expensive paywalls.

Our journalists will continue to cover the twists and turns during this historic presidential election. With your help, we'll bring you hard-hitting investigations, well-researched analysis and timely takes you can't find elsewhere. Reporting in this current political climate is a responsibility we do not take lightly, and we thank you for your support.

to keep our news free for all.

Support HuffPost

Before You Go

7 Things Your Employer Knows About You That You'd Never Expect
They Know About The Trouble You're Having At Home(01 of07)
Open Image Modal
While the legality of recording phone conversations varies from state to state, many employers have started to record conversations in and outside the workplace on company devices. So, whether you know it or not, your employer may be listening in on the conversations you have about your private life. (credit:Shutterstock)
They Know That You're Pregnant (02 of07)
Open Image Modal
Under certain circumstances, your employer may be entitled to medical information about you, especially if they provide you with health insurance. (credit:Shutterstock)
They Know That You Were Really At The Beach On Your Sick Day(03 of07)
Open Image Modal
If you brought your company cell phone, employers in some states can legally use the GPS in the device to track your every move. (credit:Getty Images)
They Know About Those Other Jobs You Are Applying To(04 of07)
Open Image Modal
Yup, that's right. Even if you are using your personal email, your employer can access all your past correspondence sent on company computers and cell phones. (credit:Shutterstock)
They Know That You're Shopping For That Upcoming Wedding At Work(05 of07)
Open Image Modal
The same goes for websites -- more likely than not, your employer is monitoring your Internet usage at work. (credit:Shutterstock)
They Know About Those Sodas You're Stealing From The Company Kitchen(06 of07)
Open Image Modal
It's called video surveillance and bad news for you -- its just becoming more and more popular! (credit:Shutterstock)
They Know About That Party You Got Wasted At Last Weekend(07 of07)
Open Image Modal
Most of us knew to keep a low profile on social media when applying for jobs, but even when you are in the door, some employers continue to track your activities . (credit:Shutterstock)