Attacks and breaches and hacks, oh my!
This year has definitely not been a good one for retail security. It all started around this time last year when Target announced that it had been hacked, leaking customers' credit card numbers and PINs for millions of accounts.
Then one after another, other stores began to fall like dominoes. Neiman Marcus, P.F. Chang's, UPS, Jimmy Johns, eBay, Home Depot, Michaels, Staples - the list goes on.
All of these stores had their security compromised through internal hacking or Point of Sale (PoS) breaches. In all cases, the payment method of customers was compromised, and some folks lost hundreds if not thousands of dollars.
But a security researcher may have stumbled upon a connection that links together two seemingly different retailers.
Brian Krebs, from Krebs on Security, has done some digging and it turns out that not all of these attacks were done by different organizations. In at least one case, malware was found communicating from two different retail stores to the same server.
Those stores were Michaels and Staples, and the main link is "the malware in both breaches was found to be communicating with the same command and control (C2) networks," according to Brian Krebs.
So what does this mean for you? It means that authorities are another step closer to finding the people responsible for the hacks and bringing them to justice.
Authorities have also found a common program with other retail threats earlier this year. Click here to learn more.
It's also a reminder to keep a close eye on your bank statements. If you see an unexplained charge on your credit or debit card, no matter how small, report it. Thieves "ping" accounts with a small charge to see if you'll notice, and then they hit hard and clean out your accounts.
Want to stay up to date on the latest retail hacks? Click here to protect yourself now.