SlideShare a Scribd company logo
1 of 8
Download to read offline
ARE YOU A

TARGET?
CAMetz
Security Consultant
Hackers
gained access to
Target's computer system.

CAMetz
Security Consultant
THEY STOLE
FINANCIAL DATA
PERSONAL DATA

of 110 million shoppers!
HOW DID THEY DO THAT?
CAMetz
Security Consultant
HACKERS often research which outside contractors/vendors have remote access to the networks
of large corporations because they make easier targets.

?
VENDOR

This attack method is known as "island hopping" and is more common than you’d think.

Very sophisticated cyber attack operation
CAMetz
Security Consultant
HACKERS
tricked an outside vendor employee into

URGENT!!
SUBJECT: YOUR WEDDING PHOTOS!
FROM: ABC PHOTOGRAPHY!
TO: MR. XY%(HLio!
DATE: 13 February 2014!
Dear Customer,!
We have some important information about your account. Please click the
link below to contact one of our representatives!

!

Dear Client,!
We have some important information about your account. Please
click the link below to contact one of our representatives.

clicking on a malicious email!
CAMetz
Security Consultant
The vendor employee with access to Target's network fell for a
"spear phishing” attack.

HACKERS sent malware-laced emails that appeared to come from
trusted sources, which took over vendor employee’s computer.
Once HACKERS gained access to the vendor employee’s computer,
they penetrated Target's system and stole the retailer's payment
card data.
CAMetz
Security Consultant
HACKERS
TARGET

virus

NETWORK

VENDOR

Researchers at a cloud security company found 55,000 so-called HVAC vendors that are
connected to the Internet.
Many vendors ignore basic computer security measures.
Reportedly, Target may not have realized the phishing attack initially, because the company
was using a free anti-malware program that does not offer real-time protection against
threats.
CAMetz
Security Consultant
DON’T BE A TARGET!

ELIMINATE
VULNERABILITIES TO
YOUR SYSTEMS AND
SENSITIVE DATA

INCREASE YOUR
SECURITY TRAINING
AND EDUCATION
PROGRAMS

Engage your IT personnel more frequently.
Tap into the experience of your security personnel.
Ensure you have a strong, solid anti-virus program program to guard your systems.
Implement regular employee security training and education programs and sessions.

IT’S A START!
CAMetz
Security Consultant

More Related Content

Viewers also liked

Rupor: PR of placemarketing
Rupor: PR of placemarketingRupor: PR of placemarketing
Rupor: PR of placemarketing
Mikhail Starov
 
To consider when buying a fireplace
To consider when buying a fireplaceTo consider when buying a fireplace
To consider when buying a fireplace
henrikalm
 
WWW REPORT
WWW REPORTWWW REPORT
WWW REPORT
alwynj
 
مفاتيح التدوين
مفاتيح التدوينمفاتيح التدوين
مفاتيح التدوين
Shatha Mohammed
 
Culture shock presentation_2011
Culture shock presentation_2011Culture shock presentation_2011
Culture shock presentation_2011
arnesjogren
 
3.1.1 sistem ekonomi fedualisme dan kapitalisme di england abad ke18 19
3.1.1  sistem ekonomi fedualisme dan kapitalisme di england abad ke18 193.1.1  sistem ekonomi fedualisme dan kapitalisme di england abad ke18 19
3.1.1 sistem ekonomi fedualisme dan kapitalisme di england abad ke18 19
Karsodikromo Yatiman
 
2 класс. lesson 39. волшебная шляпа
2 класс. lesson 39. волшебная шляпа2 класс. lesson 39. волшебная шляпа
2 класс. lesson 39. волшебная шляпа
shpinat
 
Scrivere un report con i video per zona wrestling
Scrivere un report con i video per zona wrestlingScrivere un report con i video per zona wrestling
Scrivere un report con i video per zona wrestling
Giuseppe Calò
 
Time for a holiday, case study DRAFT
Time for a holiday, case study DRAFTTime for a holiday, case study DRAFT
Time for a holiday, case study DRAFT
Claire Owen
 

Viewers also liked (20)

Mba education and its utility in the corporate world
Mba education and its utility in the corporate worldMba education and its utility in the corporate world
Mba education and its utility in the corporate world
 
Stramz bar
Stramz barStramz bar
Stramz bar
 
Rupor: PR of placemarketing
Rupor: PR of placemarketingRupor: PR of placemarketing
Rupor: PR of placemarketing
 
To consider when buying a fireplace
To consider when buying a fireplaceTo consider when buying a fireplace
To consider when buying a fireplace
 
Evaluation for Question 2
Evaluation for Question 2Evaluation for Question 2
Evaluation for Question 2
 
WWW REPORT
WWW REPORTWWW REPORT
WWW REPORT
 
Plancess at a glance
Plancess at a glancePlancess at a glance
Plancess at a glance
 
مفاتيح التدوين
مفاتيح التدوينمفاتيح التدوين
مفاتيح التدوين
 
Culture shock presentation_2011
Culture shock presentation_2011Culture shock presentation_2011
Culture shock presentation_2011
 
2 класс. lesson 35. мир верх ногами. контроль навыков и умений по разделам 5 и 6
2 класс. lesson 35. мир верх ногами. контроль навыков и умений по разделам 5 и 62 класс. lesson 35. мир верх ногами. контроль навыков и умений по разделам 5 и 6
2 класс. lesson 35. мир верх ногами. контроль навыков и умений по разделам 5 и 6
 
Ung dung Facebook cho doanh nghiep 2013
Ung dung Facebook cho doanh nghiep 2013Ung dung Facebook cho doanh nghiep 2013
Ung dung Facebook cho doanh nghiep 2013
 
Edifícios..
Edifícios..Edifícios..
Edifícios..
 
3.1.1 sistem ekonomi fedualisme dan kapitalisme di england abad ke18 19
3.1.1  sistem ekonomi fedualisme dan kapitalisme di england abad ke18 193.1.1  sistem ekonomi fedualisme dan kapitalisme di england abad ke18 19
3.1.1 sistem ekonomi fedualisme dan kapitalisme di england abad ke18 19
 
An ecology for systemic change. How to foster and empower disruptive innovati...
An ecology for systemic change. How to foster and empower disruptive innovati...An ecology for systemic change. How to foster and empower disruptive innovati...
An ecology for systemic change. How to foster and empower disruptive innovati...
 
Differentiation
DifferentiationDifferentiation
Differentiation
 
2 класс. lesson 39. волшебная шляпа
2 класс. lesson 39. волшебная шляпа2 класс. lesson 39. волшебная шляпа
2 класс. lesson 39. волшебная шляпа
 
Chapter08: Bank Legislation and Regulation PPT
Chapter08: Bank Legislation and Regulation PPTChapter08: Bank Legislation and Regulation PPT
Chapter08: Bank Legislation and Regulation PPT
 
Scrivere un report con i video per zona wrestling
Scrivere un report con i video per zona wrestlingScrivere un report con i video per zona wrestling
Scrivere un report con i video per zona wrestling
 
Introduction into Cloud Computing - part 4
Introduction into Cloud Computing - part 4Introduction into Cloud Computing - part 4
Introduction into Cloud Computing - part 4
 
Time for a holiday, case study DRAFT
Time for a holiday, case study DRAFTTime for a holiday, case study DRAFT
Time for a holiday, case study DRAFT
 

Similar to ARE YOU VULNERABLE TO HACKERS? TARGET WAS.

Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)
Sam Norallah
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
Abdelfatah hegazy
 

Similar to ARE YOU VULNERABLE TO HACKERS? TARGET WAS. (20)

securityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdfsecurityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdf
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)
 
Cyber security ppt final
Cyber security ppt finalCyber security ppt final
Cyber security ppt final
 
Common Security Issues on the Internet
Common Security Issues on the InternetCommon Security Issues on the Internet
Common Security Issues on the Internet
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
A Look Into Cyber Security
A Look Into Cyber SecurityA Look Into Cyber Security
A Look Into Cyber Security
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
E commerce-securityy
E commerce-securityyE commerce-securityy
E commerce-securityy
 
3rd Party Cyber Security: Manage your ecosystem!
3rd Party Cyber Security: Manage your ecosystem!3rd Party Cyber Security: Manage your ecosystem!
3rd Party Cyber Security: Manage your ecosystem!
 
Computerworld Conference (2002)
Computerworld Conference (2002)Computerworld Conference (2002)
Computerworld Conference (2002)
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security Breaches
 
How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!
 
Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?
 
CYBER51-FYLER
CYBER51-FYLERCYBER51-FYLER
CYBER51-FYLER
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
An Introductory Guide To Internet Security - TechDogs
An Introductory Guide To Internet Security - TechDogsAn Introductory Guide To Internet Security - TechDogs
An Introductory Guide To Internet Security - TechDogs
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

ARE YOU VULNERABLE TO HACKERS? TARGET WAS.

  • 2. Hackers gained access to Target's computer system. CAMetz Security Consultant
  • 3. THEY STOLE FINANCIAL DATA PERSONAL DATA of 110 million shoppers! HOW DID THEY DO THAT? CAMetz Security Consultant
  • 4. HACKERS often research which outside contractors/vendors have remote access to the networks of large corporations because they make easier targets. ? VENDOR This attack method is known as "island hopping" and is more common than you’d think. Very sophisticated cyber attack operation CAMetz Security Consultant
  • 5. HACKERS tricked an outside vendor employee into URGENT!! SUBJECT: YOUR WEDDING PHOTOS! FROM: ABC PHOTOGRAPHY! TO: MR. XY%(HLio! DATE: 13 February 2014! Dear Customer,! We have some important information about your account. Please click the link below to contact one of our representatives! ! Dear Client,! We have some important information about your account. Please click the link below to contact one of our representatives. clicking on a malicious email! CAMetz Security Consultant
  • 6. The vendor employee with access to Target's network fell for a "spear phishing” attack. HACKERS sent malware-laced emails that appeared to come from trusted sources, which took over vendor employee’s computer. Once HACKERS gained access to the vendor employee’s computer, they penetrated Target's system and stole the retailer's payment card data. CAMetz Security Consultant
  • 7. HACKERS TARGET virus NETWORK VENDOR Researchers at a cloud security company found 55,000 so-called HVAC vendors that are connected to the Internet. Many vendors ignore basic computer security measures. Reportedly, Target may not have realized the phishing attack initially, because the company was using a free anti-malware program that does not offer real-time protection against threats. CAMetz Security Consultant
  • 8. DON’T BE A TARGET! ELIMINATE VULNERABILITIES TO YOUR SYSTEMS AND SENSITIVE DATA INCREASE YOUR SECURITY TRAINING AND EDUCATION PROGRAMS Engage your IT personnel more frequently. Tap into the experience of your security personnel. Ensure you have a strong, solid anti-virus program program to guard your systems. Implement regular employee security training and education programs and sessions. IT’S A START! CAMetz Security Consultant