Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security IT

Target Ignored Signs of Data Breach 95

puddingebola writes "Target ignored indications from its threat-detection tools that malware had infected its network. From the article, 'Unusually for a retailer, Target was even running its own security operations center in Minneapolis, according to a report published Thursday by Bloomberg Businessweek. Among its security defenses, following a months-long testing period and May 2013 implementation, was software from attack-detection firm FireEye, which caught the initial November 30 infection of Target's payment system by malware. All told, up to five "malware.binary" alarms reportedly sounded, each graded at the top of FireEye's criticality scale, and which were seen by Target's information security teams first in Bangalore, and then Minneapolis.' Unfortunately, it appears Target's security team failed to act on the threat indicators."
This discussion has been archived. No new comments can be posted.

Target Ignored Signs of Data Breach

Comments Filter:
  • by joe_frisch ( 1366229 ) on Friday March 14, 2014 @06:08PM (#46487785)

    It isn't clear (at least to me) how many false alarms they got before they got the real one. The key to a good security monitoring system is not just to catch all the real threats, but to not flag imaginary or minor ones.

  • Re:To be fair? (Score:4, Insightful)

    by MightyMartian ( 840721 ) on Friday March 14, 2014 @06:16PM (#46487851) Journal

    Maybe they're just fucking idiots, with an IT department that either is utterly inept or had been so marginalized by MBA morons and sociopaths.

  • Re:To be fair? (Score:5, Insightful)

    by James-NSC ( 1414763 ) on Friday March 14, 2014 @06:45PM (#46488097) Homepage

    I'd wager it wasn't the security team that dropped the ball. I work in the same role (I'm the most senior member of the security team), and I can tell you first hand that I don't have the authorization to act in matters of that scope independent of the executive team in situations like those. I have to forward my recommendations up the chain and get approval.

    That causes delays. Often times, things then get lost in the executive level. Whenever there are contractors involved it's even worse as they spend a week or so arguing over whose responsibility it is, who is going to pay for it, how much down time it's going to represent, how much money they're going to lose, etc,etc, etc. Executives are also really bad at judging risk when it comes to security. They'll expose themselves and their companies to staggering amounts of risk - if for no other reason - than the fact that the failure/security breach/what-have-you isn't impacting business "right now" but shutting down an ecommerce system to patch it will impact the bottom line *right now* and they would rather risk "maybe" losing money at some future date than know they're losing money "right now".

    Executives will mortgage their companies futures at every possible opportunity for a few extra dollars today.

    The number of times I've taken a GLARING security issue up only to have the "how long can we leave it before it impacts business" be their main concern. If it's a vulnerability on a production, WAN facing system - but we don't have evidence of it being actively exploited - it's not considered to be as critical as taking that system offline for an hour to patch/test it. The certainty of lost revenue in that hour is more meaningful than the potential of abuse at a later date. Worst part of it all is that when that later date does come around and things get really bad, they all point their collective fingers at the security team and none of them take any responsibility whatsoever.

    You're damned if you do, damned if you don't and blamed all the way around.

    Corporate InfoSec is a very, very frustrating occupation. I feel for those poor guys at Target.

  • Re:To be fair? (Score:2, Insightful)

    by Anonymous Coward on Friday March 14, 2014 @07:51PM (#46488557)

    Maybe they're just fucking idiots, with an IT department that either is utterly inept or had been so marginalized by MBA morons and sociopaths.

    Or, with a name like 'Target', they were pretty much asking for it?

The optimum committee has no members. -- Norman Augustine

Working...