SlideShare une entreprise Scribd logo
1  sur  17
TREY
research
• Established in 1881
• US retail corporation
• 8th largest retailer in USA
• 1800+ stores across US
• Sells household essential, food and beverages,
apparel and accessories..etc.
2
TREY
research
Data Breach
• One of the biggest data breach in US History
• Hackers stole 40 million customers debit and credit card details
and 70 million records of personal information in between
November 27 December 2013
3
TREY
research
What is Data Breach?
A data breach is the intentional or unintentional release of secure or private/confidential information to an untrusted
environment.
• What is data breach?
• What attackers would do with stolen data?
• Types of data breach?
Inside leak
Payment card data
Loss or theft of device
Breach by mistake
Unknown breaches
4
TREY
research
Timeline
5
TREY
research
How is it happened?
• Phishing attack against Fazio Mechanical Service
• Accessing the Target network
• Gaining access to vulnerable machines
• Installing malware on POS terminals
• Collecting card information from POS
• Moving data out of the Target network
• Aggregating stolen card and person data
6
TREY
research
Attack Steps of the Target Breach
Add a footer 7
TREY
research
Why? The Reasons
Add a footer 8
• Giving access to an HVAC vendor FAZIO mechanical services to the systems.
• Target company failed to enforce the ‘security review of it’s vendors network system.
• Lack of network segmentation which have provided easy access into their network from POS to back
end systems.
• Multiple Password files were stored inside the network including the login credentials of various
systems.
• Use of many misconfigured services such as Microsoft SQL and the likes of Apache tom cat servers
using default passwords.
• Critical failure of using outdated systems and using outdated versions of software such as Apache,
IBM WebSphere etc.
TREY
research
WHO CAUSED THE ATTACK?
 Large scale data theft like the attacks against the target is usually
the work of an organized team of cybercriminals
 The group of cybercriminals behind this great hack belonged to
RUSSIA, UKRAINE along with ROMANIA
 Data were stored in three temporary location which then was
transferred to the main server (Moscow)
 Same set of people were linked to similar attack against “HOME
DEPOT” in the summer of 2014
TREY
research
CONTD - From the main server
 Data stolen from target was put on sale on black markets
(rescator.so) also known as dark web
 Traded in BITCOINS or any cryptocurrency
 Cards are sold either in batches or as a single card and the
price of each card varies. For example- target cards were sold
from price range of 20 dollars to 150 dollars
 The information can be copied onto credit card blanks to turn a
fake card into a real one.
What Do Buyers Do with Stolen Information?
TREY
research
Effects of Data Breach In Target
Add a footer 11
• REPUTATION DAMAGE
• Lose customer trust and business
• FINANCIAL LOSS
• $116 millions on settlement
• Holiday sale fall
• Huge net loss
• OPERATIONAL DISRUPTION
• CEO Resigns
• Layoffs and hiring freeze
TREY
research
How to prevent Data Breach
12
• Vulnerability and compliance management
• Safeguard physical data
• Train employees in security principles
• Protect information, computers and networks
from cyber attacks
• Make backup copies of important business
data information
• Protect portable devices
• Use data encryption and strong password
protections
TREY
research
Lessons Can Be Drawn From This Case
13
• EMV Technology Alone Is Not Enough to Stop Fraud
• Network Segmentation Is a Necessity
• Third-Party Oversight Is Part of Compliance
• Log Monitoring Needs Analytics
• Cyber threat Intelligence Sharing Must Improve
• Implemented POS management tools
• Expanded the use of two-factor authentication and password vaults
• Limited or disabled vendor access to their network
• Improved firewall rules and policies
• Implemented POS management tools
If these changes have been implemented as Target describes, they would help address the weaknesses
exploited during the attack
TREY
research
The Final Lesson of The Target Data Breach
14
• It’s important for merchants to understand that the range of security threats can be wider than
standard PCI compliance. Monitoring networks and being attentive to disruptive or unusual patterns
in a system’s network is crucial to protecting their systems – and in turn, customer data. Target is
just one of many companies to have faced a major data breach. Make sure your company or business
is protecting your customers the best they can.
TREY
research
Conclusion
15
There is no silver bullet in cyber space against data breaches. With the increasing amount of data leak
incidents in recent years, it is important to analyze the weak points in our systems, techniques and
legislations and to seek solutions to the issue.
TREY
research
Q&A
16
 What is the major cause of data breach incident in target?
 As a manager, what would be your first step if your company
gets any cyber attacks like data breaches? And also explain
about further steps you are going to make?
 tell about the best 3 ways to prevent a data breach in any
organization?
 What are the consequences of a data breach?
 As a business student, What did you learn from this case
study?
TREY
research
17
Thank You

Contenu connexe

Tendances

Equifax data breach
Equifax data breachEquifax data breach
Equifax data breachSajib Sen
 
Case Study on Coach K: A matter of the heart
Case Study on Coach K: A matter of the heartCase Study on Coach K: A matter of the heart
Case Study on Coach K: A matter of the heartClaraN1
 
Educomp-Case Study
Educomp-Case StudyEducomp-Case Study
Educomp-Case StudyPankil Shah
 
Oscar mayer - There is always a Better Way
Oscar mayer - There is always a Better WayOscar mayer - There is always a Better Way
Oscar mayer - There is always a Better WayVikas C
 
Zara : it for fast fashion
Zara : it for fast fashionZara : it for fast fashion
Zara : it for fast fashionAkshay Borhade
 
London Jets Case Study Solution , RFM Analysis
London Jets Case Study Solution , RFM AnalysisLondon Jets Case Study Solution , RFM Analysis
London Jets Case Study Solution , RFM AnalysisAbhi Arya
 
Harrah's Entertainment, Inc. Case Analysis
Harrah's Entertainment, Inc. Case AnalysisHarrah's Entertainment, Inc. Case Analysis
Harrah's Entertainment, Inc. Case Analysismbartugs
 
HubSpot - Inbound marketing and web 2.0 case study
HubSpot - Inbound marketing and web 2.0 case studyHubSpot - Inbound marketing and web 2.0 case study
HubSpot - Inbound marketing and web 2.0 case studyRonak Shah
 
harrah entertainment inc - case study
harrah entertainment inc - case studyharrah entertainment inc - case study
harrah entertainment inc - case studyTushar Arora
 
Cisco System Inc. Implementing ERP
Cisco System Inc. Implementing ERPCisco System Inc. Implementing ERP
Cisco System Inc. Implementing ERPVinay Gk
 
Data breach presentation
Data breach presentationData breach presentation
Data breach presentationBradford Bach
 
ATLANTIC COMPUTER: A BUNDLE OF PRICING OPTIONS
ATLANTIC COMPUTER: A BUNDLE OF PRICING OPTIONS ATLANTIC COMPUTER: A BUNDLE OF PRICING OPTIONS
ATLANTIC COMPUTER: A BUNDLE OF PRICING OPTIONS Akshay Jain
 
United breaks Guitar Casestudy
United breaks Guitar CasestudyUnited breaks Guitar Casestudy
United breaks Guitar CasestudyGangadhara Rao
 
Sales Force Training at Arrow Electronics - Case Analysis
Sales Force Training at Arrow Electronics - Case AnalysisSales Force Training at Arrow Electronics - Case Analysis
Sales Force Training at Arrow Electronics - Case AnalysisNikhil Saraf
 
Cyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial SectorCyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial SectorFarook Al-Jibouri
 
Cola Wars - Coke Vs Pepsi Harvard Business School Case Study
Cola Wars - Coke Vs Pepsi Harvard Business School Case StudyCola Wars - Coke Vs Pepsi Harvard Business School Case Study
Cola Wars - Coke Vs Pepsi Harvard Business School Case StudyMohan Kanni
 

Tendances (20)

Equifax data breach
Equifax data breachEquifax data breach
Equifax data breach
 
Case Study on Coach K: A matter of the heart
Case Study on Coach K: A matter of the heartCase Study on Coach K: A matter of the heart
Case Study on Coach K: A matter of the heart
 
Educomp-Case Study
Educomp-Case StudyEducomp-Case Study
Educomp-Case Study
 
Oscar mayer - There is always a Better Way
Oscar mayer - There is always a Better WayOscar mayer - There is always a Better Way
Oscar mayer - There is always a Better Way
 
Data breach at sony
Data breach at sonyData breach at sony
Data breach at sony
 
Charles schwab
Charles schwabCharles schwab
Charles schwab
 
Zara : it for fast fashion
Zara : it for fast fashionZara : it for fast fashion
Zara : it for fast fashion
 
London Jets Case Study Solution , RFM Analysis
London Jets Case Study Solution , RFM AnalysisLondon Jets Case Study Solution , RFM Analysis
London Jets Case Study Solution , RFM Analysis
 
Harrah's Entertainment, Inc. Case Analysis
Harrah's Entertainment, Inc. Case AnalysisHarrah's Entertainment, Inc. Case Analysis
Harrah's Entertainment, Inc. Case Analysis
 
HubSpot - Inbound marketing and web 2.0 case study
HubSpot - Inbound marketing and web 2.0 case studyHubSpot - Inbound marketing and web 2.0 case study
HubSpot - Inbound marketing and web 2.0 case study
 
harrah entertainment inc - case study
harrah entertainment inc - case studyharrah entertainment inc - case study
harrah entertainment inc - case study
 
Cisco System Inc. Implementing ERP
Cisco System Inc. Implementing ERPCisco System Inc. Implementing ERP
Cisco System Inc. Implementing ERP
 
Data breach presentation
Data breach presentationData breach presentation
Data breach presentation
 
ATLANTIC COMPUTER: A BUNDLE OF PRICING OPTIONS
ATLANTIC COMPUTER: A BUNDLE OF PRICING OPTIONS ATLANTIC COMPUTER: A BUNDLE OF PRICING OPTIONS
ATLANTIC COMPUTER: A BUNDLE OF PRICING OPTIONS
 
United breaks Guitar Casestudy
United breaks Guitar CasestudyUnited breaks Guitar Casestudy
United breaks Guitar Casestudy
 
Sales Force Training at Arrow Electronics - Case Analysis
Sales Force Training at Arrow Electronics - Case AnalysisSales Force Training at Arrow Electronics - Case Analysis
Sales Force Training at Arrow Electronics - Case Analysis
 
Case Study_Welspun India
Case Study_Welspun IndiaCase Study_Welspun India
Case Study_Welspun India
 
Cyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial SectorCyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial Sector
 
Group3 Bmb Otisline
Group3 Bmb OtislineGroup3 Bmb Otisline
Group3 Bmb Otisline
 
Cola Wars - Coke Vs Pepsi Harvard Business School Case Study
Cola Wars - Coke Vs Pepsi Harvard Business School Case StudyCola Wars - Coke Vs Pepsi Harvard Business School Case Study
Cola Wars - Coke Vs Pepsi Harvard Business School Case Study
 

Similaire à Target data breach case study

The Target Breach - Follow The Money EU
The Target Breach - Follow The Money EUThe Target Breach - Follow The Money EU
The Target Breach - Follow The Money EUResilient Systems
 
Cyber breach at target.pptx
Cyber breach at target.pptxCyber breach at target.pptx
Cyber breach at target.pptxVarunLala2
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 
The good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breachThe good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breachUlf Mattsson
 
2015-03-24 IT Security - What You Need to Know
2015-03-24 IT Security - What You Need to Know2015-03-24 IT Security - What You Need to Know
2015-03-24 IT Security - What You Need to KnowRaffa Learning Community
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBakerTillyConsulting
 
The Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingThe Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingat MicroFocus Italy ❖✔
 
Business of Hacking
Business of HackingBusiness of Hacking
Business of HackingDaniel Ross
 
2017-03-30 IT Security - What You Need To Know
2017-03-30 IT Security - What You Need To Know2017-03-30 IT Security - What You Need To Know
2017-03-30 IT Security - What You Need To KnowRaffa Learning Community
 
2015-06-16 IT Security - What You Need to Know
2015-06-16 IT Security - What You Need to Know2015-06-16 IT Security - What You Need to Know
2015-06-16 IT Security - What You Need to KnowRaffa Learning Community
 
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docxaryan532920
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsGDSCCVR
 
2016-09-14 IT Security What You Need to Know
2016-09-14 IT Security What You Need to Know2016-09-14 IT Security What You Need to Know
2016-09-14 IT Security What You Need to KnowRaffa Learning Community
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingJoe Nathans
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersUnited Security Providers AG
 
Knowing your Enemies - Leveraging Data Analysis to Expose Phishing Patterns A...
Knowing your Enemies - Leveraging Data Analysis to Expose Phishing Patterns A...Knowing your Enemies - Leveraging Data Analysis to Expose Phishing Patterns A...
Knowing your Enemies - Leveraging Data Analysis to Expose Phishing Patterns A...Javier Vargas
 
Gathering Intel from the Dark Web to Identify and Prioritize Critical Risks
Gathering Intel from the Dark Web to Identify and Prioritize Critical RisksGathering Intel from the Dark Web to Identify and Prioritize Critical Risks
Gathering Intel from the Dark Web to Identify and Prioritize Critical RisksSurfWatch Labs
 
Cybersecurity for Marketing
Cybersecurity for Marketing Cybersecurity for Marketing
Cybersecurity for Marketing Alert Logic
 

Similaire à Target data breach case study (20)

The Target Breach - Follow The Money EU
The Target Breach - Follow The Money EUThe Target Breach - Follow The Money EU
The Target Breach - Follow The Money EU
 
Cyber breach at target.pptx
Cyber breach at target.pptxCyber breach at target.pptx
Cyber breach at target.pptx
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
The good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breachThe good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breach
 
GDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsGDPR Part 1: Quick Facts
GDPR Part 1: Quick Facts
 
2015-03-24 IT Security - What You Need to Know
2015-03-24 IT Security - What You Need to Know2015-03-24 IT Security - What You Need to Know
2015-03-24 IT Security - What You Need to Know
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in Cybersecurity
 
The Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingThe Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hacking
 
Business of Hacking
Business of HackingBusiness of Hacking
Business of Hacking
 
2017-03-30 IT Security - What You Need To Know
2017-03-30 IT Security - What You Need To Know2017-03-30 IT Security - What You Need To Know
2017-03-30 IT Security - What You Need To Know
 
2015-06-16 IT Security - What You Need to Know
2015-06-16 IT Security - What You Need to Know2015-06-16 IT Security - What You Need to Know
2015-06-16 IT Security - What You Need to Know
 
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
 
2016-09-14 IT Security What You Need to Know
2016-09-14 IT Security What You Need to Know2016-09-14 IT Security What You Need to Know
2016-09-14 IT Security What You Need to Know
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive Briefing
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security Providers
 
Knowing your Enemies - Leveraging Data Analysis to Expose Phishing Patterns A...
Knowing your Enemies - Leveraging Data Analysis to Expose Phishing Patterns A...Knowing your Enemies - Leveraging Data Analysis to Expose Phishing Patterns A...
Knowing your Enemies - Leveraging Data Analysis to Expose Phishing Patterns A...
 
Gathering Intel from the Dark Web to Identify and Prioritize Critical Risks
Gathering Intel from the Dark Web to Identify and Prioritize Critical RisksGathering Intel from the Dark Web to Identify and Prioritize Critical Risks
Gathering Intel from the Dark Web to Identify and Prioritize Critical Risks
 
Cybersecurity for Marketing
Cybersecurity for Marketing Cybersecurity for Marketing
Cybersecurity for Marketing
 
nerfslides.pptx
nerfslides.pptxnerfslides.pptx
nerfslides.pptx
 

Plus de Abhilash vijayan

TITAN RAGA EVOLVING WATCH BRAND FOR THE CHANGING CONSUMER.pdf
TITAN RAGA EVOLVING WATCH BRAND FOR THE CHANGING CONSUMER.pdfTITAN RAGA EVOLVING WATCH BRAND FOR THE CHANGING CONSUMER.pdf
TITAN RAGA EVOLVING WATCH BRAND FOR THE CHANGING CONSUMER.pdfAbhilash vijayan
 
INTRINSIC VALUE FOUNDATION.pdf
INTRINSIC VALUE FOUNDATION.pdfINTRINSIC VALUE FOUNDATION.pdf
INTRINSIC VALUE FOUNDATION.pdfAbhilash vijayan
 
Assessment centre method performance appraisal.pdf
Assessment centre method performance appraisal.pdfAssessment centre method performance appraisal.pdf
Assessment centre method performance appraisal.pdfAbhilash vijayan
 
Managing customer relationship
Managing customer relationshipManaging customer relationship
Managing customer relationshipAbhilash vijayan
 
Newsletter, press release, publicity materials
Newsletter, press release, publicity materialsNewsletter, press release, publicity materials
Newsletter, press release, publicity materialsAbhilash vijayan
 
Privatization in business and air india
Privatization in business and air indiaPrivatization in business and air india
Privatization in business and air indiaAbhilash vijayan
 

Plus de Abhilash vijayan (12)

TITAN RAGA EVOLVING WATCH BRAND FOR THE CHANGING CONSUMER.pdf
TITAN RAGA EVOLVING WATCH BRAND FOR THE CHANGING CONSUMER.pdfTITAN RAGA EVOLVING WATCH BRAND FOR THE CHANGING CONSUMER.pdf
TITAN RAGA EVOLVING WATCH BRAND FOR THE CHANGING CONSUMER.pdf
 
INTRINSIC VALUE FOUNDATION.pdf
INTRINSIC VALUE FOUNDATION.pdfINTRINSIC VALUE FOUNDATION.pdf
INTRINSIC VALUE FOUNDATION.pdf
 
Brand Personality.pdf
Brand Personality.pdfBrand Personality.pdf
Brand Personality.pdf
 
Assessment centre method performance appraisal.pdf
Assessment centre method performance appraisal.pdfAssessment centre method performance appraisal.pdf
Assessment centre method performance appraisal.pdf
 
MI Distribution.pdf
MI Distribution.pdfMI Distribution.pdf
MI Distribution.pdf
 
Need theory
Need theoryNeed theory
Need theory
 
Sales blunders
Sales blunders Sales blunders
Sales blunders
 
Managing customer relationship
Managing customer relationshipManaging customer relationship
Managing customer relationship
 
Hindustan unilever
Hindustan unileverHindustan unilever
Hindustan unilever
 
Newsletter, press release, publicity materials
Newsletter, press release, publicity materialsNewsletter, press release, publicity materials
Newsletter, press release, publicity materials
 
Farm bill 2020
Farm bill 2020Farm bill 2020
Farm bill 2020
 
Privatization in business and air india
Privatization in business and air indiaPrivatization in business and air india
Privatization in business and air india
 

Dernier

Transform Your Outdoor Space: Landscaping with Plants in Singapore
Transform Your Outdoor Space: Landscaping with Plants in SingaporeTransform Your Outdoor Space: Landscaping with Plants in Singapore
Transform Your Outdoor Space: Landscaping with Plants in SingaporeThe Green Corner
 
Don’t Get Showroomed- Are you frustrated with showrooming?
Don’t Get Showroomed- Are you frustrated with showrooming?Don’t Get Showroomed- Are you frustrated with showrooming?
Don’t Get Showroomed- Are you frustrated with showrooming?Jasper Colin
 
The 2024 Prime Day Panel: From Preparation to Profit
The 2024 Prime Day Panel: From Preparation to ProfitThe 2024 Prime Day Panel: From Preparation to Profit
The 2024 Prime Day Panel: From Preparation to ProfitTinuiti
 
Hifi Agartala Escorts Service Girl ^ 9332606886, WhatsApp Anytime Agartala
Hifi Agartala Escorts Service Girl ^ 9332606886, WhatsApp Anytime AgartalaHifi Agartala Escorts Service Girl ^ 9332606886, WhatsApp Anytime Agartala
Hifi Agartala Escorts Service Girl ^ 9332606886, WhatsApp Anytime Agartalameghakumariji156
 
Digital Business Strategy - How Food Brands Compete Through Technology
Digital Business Strategy - How Food Brands Compete Through TechnologyDigital Business Strategy - How Food Brands Compete Through Technology
Digital Business Strategy - How Food Brands Compete Through TechnologyJoanne Cabaero
 
5CL-ADBA,5cladba, the best supplier in China
5CL-ADBA,5cladba, the best supplier in China5CL-ADBA,5cladba, the best supplier in China
5CL-ADBA,5cladba, the best supplier in Chinaamy56318795
 
Supermarket Floral Ad Roundup- Week 19 2024.pdf
Supermarket Floral Ad Roundup- Week 19 2024.pdfSupermarket Floral Ad Roundup- Week 19 2024.pdf
Supermarket Floral Ad Roundup- Week 19 2024.pdfKarliNelson4
 
Planting Seeds of Success and of Failure.pdf
Planting Seeds of Success and of Failure.pdfPlanting Seeds of Success and of Failure.pdf
Planting Seeds of Success and of Failure.pdfJasper Colin
 

Dernier (8)

Transform Your Outdoor Space: Landscaping with Plants in Singapore
Transform Your Outdoor Space: Landscaping with Plants in SingaporeTransform Your Outdoor Space: Landscaping with Plants in Singapore
Transform Your Outdoor Space: Landscaping with Plants in Singapore
 
Don’t Get Showroomed- Are you frustrated with showrooming?
Don’t Get Showroomed- Are you frustrated with showrooming?Don’t Get Showroomed- Are you frustrated with showrooming?
Don’t Get Showroomed- Are you frustrated with showrooming?
 
The 2024 Prime Day Panel: From Preparation to Profit
The 2024 Prime Day Panel: From Preparation to ProfitThe 2024 Prime Day Panel: From Preparation to Profit
The 2024 Prime Day Panel: From Preparation to Profit
 
Hifi Agartala Escorts Service Girl ^ 9332606886, WhatsApp Anytime Agartala
Hifi Agartala Escorts Service Girl ^ 9332606886, WhatsApp Anytime AgartalaHifi Agartala Escorts Service Girl ^ 9332606886, WhatsApp Anytime Agartala
Hifi Agartala Escorts Service Girl ^ 9332606886, WhatsApp Anytime Agartala
 
Digital Business Strategy - How Food Brands Compete Through Technology
Digital Business Strategy - How Food Brands Compete Through TechnologyDigital Business Strategy - How Food Brands Compete Through Technology
Digital Business Strategy - How Food Brands Compete Through Technology
 
5CL-ADBA,5cladba, the best supplier in China
5CL-ADBA,5cladba, the best supplier in China5CL-ADBA,5cladba, the best supplier in China
5CL-ADBA,5cladba, the best supplier in China
 
Supermarket Floral Ad Roundup- Week 19 2024.pdf
Supermarket Floral Ad Roundup- Week 19 2024.pdfSupermarket Floral Ad Roundup- Week 19 2024.pdf
Supermarket Floral Ad Roundup- Week 19 2024.pdf
 
Planting Seeds of Success and of Failure.pdf
Planting Seeds of Success and of Failure.pdfPlanting Seeds of Success and of Failure.pdf
Planting Seeds of Success and of Failure.pdf
 

Target data breach case study

  • 1.
  • 2. TREY research • Established in 1881 • US retail corporation • 8th largest retailer in USA • 1800+ stores across US • Sells household essential, food and beverages, apparel and accessories..etc. 2
  • 3. TREY research Data Breach • One of the biggest data breach in US History • Hackers stole 40 million customers debit and credit card details and 70 million records of personal information in between November 27 December 2013 3
  • 4. TREY research What is Data Breach? A data breach is the intentional or unintentional release of secure or private/confidential information to an untrusted environment. • What is data breach? • What attackers would do with stolen data? • Types of data breach? Inside leak Payment card data Loss or theft of device Breach by mistake Unknown breaches 4
  • 6. TREY research How is it happened? • Phishing attack against Fazio Mechanical Service • Accessing the Target network • Gaining access to vulnerable machines • Installing malware on POS terminals • Collecting card information from POS • Moving data out of the Target network • Aggregating stolen card and person data 6
  • 7. TREY research Attack Steps of the Target Breach Add a footer 7
  • 8. TREY research Why? The Reasons Add a footer 8 • Giving access to an HVAC vendor FAZIO mechanical services to the systems. • Target company failed to enforce the ‘security review of it’s vendors network system. • Lack of network segmentation which have provided easy access into their network from POS to back end systems. • Multiple Password files were stored inside the network including the login credentials of various systems. • Use of many misconfigured services such as Microsoft SQL and the likes of Apache tom cat servers using default passwords. • Critical failure of using outdated systems and using outdated versions of software such as Apache, IBM WebSphere etc.
  • 9. TREY research WHO CAUSED THE ATTACK?  Large scale data theft like the attacks against the target is usually the work of an organized team of cybercriminals  The group of cybercriminals behind this great hack belonged to RUSSIA, UKRAINE along with ROMANIA  Data were stored in three temporary location which then was transferred to the main server (Moscow)  Same set of people were linked to similar attack against “HOME DEPOT” in the summer of 2014
  • 10. TREY research CONTD - From the main server  Data stolen from target was put on sale on black markets (rescator.so) also known as dark web  Traded in BITCOINS or any cryptocurrency  Cards are sold either in batches or as a single card and the price of each card varies. For example- target cards were sold from price range of 20 dollars to 150 dollars  The information can be copied onto credit card blanks to turn a fake card into a real one. What Do Buyers Do with Stolen Information?
  • 11. TREY research Effects of Data Breach In Target Add a footer 11 • REPUTATION DAMAGE • Lose customer trust and business • FINANCIAL LOSS • $116 millions on settlement • Holiday sale fall • Huge net loss • OPERATIONAL DISRUPTION • CEO Resigns • Layoffs and hiring freeze
  • 12. TREY research How to prevent Data Breach 12 • Vulnerability and compliance management • Safeguard physical data • Train employees in security principles • Protect information, computers and networks from cyber attacks • Make backup copies of important business data information • Protect portable devices • Use data encryption and strong password protections
  • 13. TREY research Lessons Can Be Drawn From This Case 13 • EMV Technology Alone Is Not Enough to Stop Fraud • Network Segmentation Is a Necessity • Third-Party Oversight Is Part of Compliance • Log Monitoring Needs Analytics • Cyber threat Intelligence Sharing Must Improve • Implemented POS management tools • Expanded the use of two-factor authentication and password vaults • Limited or disabled vendor access to their network • Improved firewall rules and policies • Implemented POS management tools If these changes have been implemented as Target describes, they would help address the weaknesses exploited during the attack
  • 14. TREY research The Final Lesson of The Target Data Breach 14 • It’s important for merchants to understand that the range of security threats can be wider than standard PCI compliance. Monitoring networks and being attentive to disruptive or unusual patterns in a system’s network is crucial to protecting their systems – and in turn, customer data. Target is just one of many companies to have faced a major data breach. Make sure your company or business is protecting your customers the best they can.
  • 15. TREY research Conclusion 15 There is no silver bullet in cyber space against data breaches. With the increasing amount of data leak incidents in recent years, it is important to analyze the weak points in our systems, techniques and legislations and to seek solutions to the issue.
  • 16. TREY research Q&A 16  What is the major cause of data breach incident in target?  As a manager, what would be your first step if your company gets any cyber attacks like data breaches? And also explain about further steps you are going to make?  tell about the best 3 ways to prevent a data breach in any organization?  What are the consequences of a data breach?  As a business student, What did you learn from this case study?