Malware in Target Breach Has Affected 1,000 Other Businesses

August 26, 2014, Written By Natalie Rutledge
Malware Abstract Background

The data breach at Target late last year shattered consumer trust, and that confidence has been further eroded by numerous breaches throughout 2014. Just last week, two more companies, SuperValu and UPS Stores, reported significant breaches. But what is becoming evident now is the link between so many of these security breaches.

In an advisory released on Friday, the Department of Homeland Security estimates more than 1,000 businesses have been affected by the same “Backoff” malware that led to the Target breach.

The malware targets the point-of-sale systems and is able to copy the personal security information from the transaction. DHS has ordered all retailers to closely check their point-of-sale systems for anything suspicious. 

In July, Homeland Security, the Secret Service and the National Cybersecurity and Communications Integration Center warned retailers to check their in-store cash registers for evidence of Backoff. Hundreds of reports began flooding in, and that number has now exceeded 1,000.

But retailers are not the only ones that should be on alert about this issue. Consumers must also keep an eye out for suspicious activities on their accounts. If you notice any troubles on any of your credit card accounts, report them to your bank or credit card company immediately. This will lead to an investigation with the stores where the suspicious activity occurred, which may help investigators pinpoint additional security issues.



The information contained within this article was accurate as of August 26, 2014. For up-to-date
information on any of the terms, cards or offers mentioned above, visit the issuer's website.


About Natalie Rutledge

Natalie Rutledge majored in Communications at Mississippi State University. She was in sales for a number of businesses and spent nine years working as a communications advisor to various entities. Natalie can be contacted directly at [email protected]
View all posts by Natalie Rutledge