BOSTON/WASHINGTON - Target Corpâs security software detected potentially malicious activity during last yearâs massive data breach, but its staff decided not to take immediate action, the No. 3. U.S. retailer said on Thursday.
âWith the benefit of hindsight, we are investigating whether if different judgments had been made the outcome may have been different,â company spokeswoman Molly Snyder said in a statement.
The disclosure came after Bloomberg Businessweek reported Thursday that Targetâs security team in Bangalore had received alerts from a FireEye Inc security system on November 30 after the attack was launched and sent them to Target headquarters in Minneapolis.
The FireEye reports indicated malicious software had appeared in the system, according to a person whom Bloomberg Businessweek had consulted on Targetâs investigation but was not authorized to speak publicly on the matter.
The alert from FireEye labeled the threat with the generic name âmalware.binary,â according to Bloomberg Businessweek. Two security experts who advise organizations in responding to cyber attacks and both have experience using FireEye technology said that security personnel typically donât get excited about such generic alerts because FireEye does not provide much information about those threats.
The experts said that they believed it was likely that Targetâs security team received hundreds of such alerts on a daily basis, which would have made it tough to have singled out that threat as being particularly malicious.
âThey are bombarded with alerts. They get so many that they just donât respond to everything,â said Shane Shook, an executive with Cylance Inc. âIt is completely understandable how this happened.â
John Strand, owner of Black Hills Information Security, said that it was easy to paint Target as being incompetent, given the severity of the breach, but that it was not fair to do so.
âTarget is a huge organization. They probably get hundreds of these alerts a day,â he said. âWe can always look for someone to blame. Sometimes it just doesnât work that way.â
Target Chief Financial Officer John Mulligan told a congressional committee in February that the company only began investigating after Dec. 12, when the U.S. Justice Department warned the company about suspicious activity involving payment cards. Within three days, nearly all the malicious software had been removed from Targetâs cash registers, he said.