Introduction
Overview
In 2013, during the peak holiday shopping season, Target, one of the largest retail chains in the United States, fell victim to a massive cyber attack. Hackers gained unauthorized access to Target's internal systems, compromising detailed information for approximately 40 million credit and debit card accounts and personal data for about 70 million customers. Despite Target's substantial investment in cybersecurity, including sophisticated malware detection software and a large security team, the breach occurred due to a phishing attack on a third-party vendor, Fazio Mechanical. The hackers exploited this breach to steal login credentials for Target's system and deploy malware, resulting in catastrophic financial losses and significant damage to Target's reputation.
Vulnerability Details
The vulnerability exploited in the Target breach stemmed from a phishing attack on a third-party vendor, Fazio Mechanical. An employee of Fazio fell for a fraudulent email containing a malicious attachment, which enabled the hackers to deploy the Citadel Trojan horseāa variant of the well-known ZeuS malware. Despite Target's security measures, including the use of sophisticated malware detection software, the malware remained undetected on Fazio's systems. Subsequently, the hackers obtained login credentials for Target's network and deployed additional malware, which went unnoticed even after multiple alerts were issued by the malware detection system. This failure to respond to security alerts and disable automated malware deletion features allowed the hackers to exfiltrate sensitive data over a two-week period, leading to substantial financial losses and reputational damage for Target.
Learning Objectives
- Describe real-world cyber breaches and how these breaches could have been prevented
- Explain common offensive cybersecurity techniques, including email phishing, vulnerability scanning, and privilege escalation
- Explain common cybersecurity defense techniques and common vulnerabilities
- Summarize how multiple security systems are integrated and how to establish a holistic view of cybersecurity in an enterprise environment