Bluefield Daily Telegraph, Bluefield, WV

National and World

January 18, 2014

Hackers probably attacked companies beyond Target, report says

(Continued)

WASHINGTON —

According to the iSIGHT analysis, the software infects POS terminals, sends out the stolen information, then covers its tracks by automatically deleting those files.

The difficulty of detecting and tracing the attacks is what makes them so dangerous and has allowed hackers to breach multiple retailers over the last several months, according to the report.

The malicious software, named for a Russian word that appears several times in the code, was sold in black-market web forums starting last summer and was customized by hackers to fit specific victims, making attacks more effective, iSIGHT's Watters said.

The attacks show how cybercriminals are outpacing the ability of companies to respond, Watters said.

— With assistance from Cotten Timberlake in Washington and Renee Dudley in New York.

Text Only
National and World
Local News
AP Video
Arizona Prison Chief: Execution Wasn't Botched Calif. Police Investigate Peacock Shooting Death Police: Doctor Who Shot Gunman 'Saved Lives' MN Twins Debut Beer Vending Machine DA: Pa. Doctor Fired Back at Hospital Gunman Raw: Iowa Police Dash Cam Shows Wild Chase Obama Seeks Limits on US Company Mergers Abroad Large Family to Share NJ Lottery Winnings U.S. Flights to Israel Resume After Ban Lifted TSA Administrator on Politics and Flight Bans Raw: National Guard Helps Battle WA Wildfires Senators Push to End Hamas Threat in Cease-Fire Raw: Deadly Storm Hits Virginia Campground Officials Warn of Avoidable Death in Hot Cars Death Penalty Expert: 'This is a Turning Point' House Committee at Odds Over Obama Lawsuit Biden Talks Economy and Civil Rights Arizona Execution Takes Almost Two Hours Gen. Odierno Discusses Ukraine, NATO at Forum Mint Gives JFK Coin a Face-lift
Sister Newspapers' News