1.1276878-1000365399
A shopper enters a Neiman Marcus store in Oak Brook, Illinois, a suburb of Chicago. Luxury department store chain Neiman Marcus said on January 10, 2014 that hackers may have stolen customers' credit and debit card information, the second cyber attack on a retailer in recent weeks. Neiman Marcus does not know the number of customers affected by the intrusion, company spokesperson Ginger Reeder said. Image Credit: Reuters

Boston/Washington: Target Corp’s and Neiman Marcus are not the only US retailers whose networks were breached over the holiday shopping season last year, according to sources. Smaller breaches on at least three other well-known US retailers took place and were conducted using similar techniques as the one on Target.

Those breaches have yet to come to light. Also, similar breaches may have occurred earlier last year. The sources said that they involved retailers with outlets in malls, but declined to elaborate. They also said that while they suspect the perpetrators may be the same as those who launched the Target attack, they cannot be sure because they are still trying to find the culprits behind all of the security breaches.

Law enforcement sources have said they suspect the ring leaders are from Eastern Europe, which is where most big cyber crime cases have been hatched over the past decade. Only one well-known retailer, Neiman Marcus, has said that they too have been victim of a cyber attack since Target’s December 19 disclosure that some 40 million payment card numbers had been stolen in a cyber attack. On Friday, Target said the data breach was worse than initially thought.

An investigation found that hackers stole the personal information of at least 70 million customers, including names, mailing addresses, telephone numbers and email addresses. Neiman Marcus said it was not sure if the breach was related to the Target incident.

Most states have laws that require companies to contact customers when certain personal information is compromised. In many cases the task of notification falls on the credit card issuer. Merchants are required to report breaches of personal information including social security numbers.

It was not immediately clear if that was the case with the retailers who were attacked around the same time as Target.

 

Most sensitive data

Target has not disclosed how the attackers managed to breach its network or siphon off some of its most sensitive data. The sources who spoke to Reuters about the breaches said that investigators believe the attackers used similar techniques and pieces of malicious software to steal data from Target and other retailers.

One of the pieces of malware they used was something known as a RAM scraper, or memory-parsing software, which enables cyber criminals to grab encrypted data by capturing it when it travels through the live memory of a computer, where it appears in plain text, the sources said.

While the technology has been around for many years, its use has increased in recent years as retailers have improved their security, making it more difficult for hackers to obtain credit card data using other approaches.

Visa Inc issued two alerts last year about a surge in cyber attacks on retailers that specifically warned about the threat from memory parsing malware. The alerts, published in April and August, provided retailers with technical details on how the attacks were launched and advice on thwarting them.

It was not clear whether Target’s security team had implemented the measures that Visa had recommended to mitigate the risks of being attacked.

Yet a law enforcement source familiar with the breach said that even if the retailer had implemented those steps, the efforts may not have succeeded in stopping the attack.

That is because the attackers were more sophisticated than the ones in the previous attacks described in the Visa alerts, according to the source.