recommended reading

Target Data Breach Saga Is Starting to Resemble an International Spy Thriller

Lynn Watson/

The massive data breach that struck Target over the holiday shopping season may have been part of a larger, unprecedented attack on U.S. retailers by Russian hackers, according to a new report by cyber security firm iSIGHT Partners and the U.S. Secret Service. The Associated Press explains that the malicious software hackers used to steal personal customer data from retailers' point of sales systems is almost certainly derived from BlackPOS software, which uses malware script from Russia. 

The confidential report, sent to retailers on Thursday, notes that though "the use of malware to compromise payment information storage systems is not new," this is "the first time we have seen this attack at this scale and sophistication." According to the report, the invasive code poses a threat to retailers because it is incredibly difficult to trace. The AP reports

Because this kind of software can "cover its own tracks," it's not possible to determine the scale, scope and reach of the breach without detailed forensic analysis. "Organizations may not know they are infected," the report said. "Once infected, they may not be able to determine how much data has been lost."

According to the analysts, the malware code was first distributed months ago and victims are still vulnerable to theft.

Read the full story at

(Image via Lynn Watson /

Threatwatch Alert

Network intrusion

FBI Warns Doctors, Dentists Their FTP Servers Are Targets

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.


When you download a report, your information may be shared with the underwriters of that document.