Preview

Target's Fraud Case Analysis

Good Essays
Open Document
Open Document
264 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Target's Fraud Case Analysis
In December 2013, Target learned that hackers had entered their data system, gaining access to 40 million customer’s credit and debit card information. While undergoing investigation, Target determined that certain guest information was also stolen. The information consisted of names, email/mailing and phone numbers.

There is much speculation and claim that Target could have prevented the cyber-security breach, had they not ignored the warnings. The CIA and the Pentagon has the same security system, that has a sophisticated way of catching malware attacks in real-time. “Six months before the breach occurred, Target spent $1.6 million on a anti-malware system called Fire Eye that actually caught the hack and could have automatically eradicated the malware without any human interaction, however, that feature was turned off” (Smith, 2014, p.1). Thanks to various clues and traces the hackers left behind, authorities identified a 22-year old Ukrainian as the main culprit. “It’s possible he was the ringleader of a band of hackers that performed the attack and that he hired other members of an Ocean 11-like team, who wrote the malware which the others then used to mine data from Target’s servers” (Smith, 2014, p.1).
…show more content…
Also, the company agreed to a settlement in the amount of $10 million through a class action lawsuit. Payments were disbursed into an escrow account to each victim. In addition, they created a new position of chief information security officer, responsible for overseeing and protecting all customer

You May Also Find These Documents Helpful

  • Good Essays

    On December 19th Target revealed that 40 million credit and debit card accounts were compromised by a data breach. The information had appeared to be stole around black friday of 2013. This is the busiest shopping day of the year.The retailer said that the information stolen between November 27 and December 15, 2013 included personal information of as many as 70 million people more than the 40 million the company originally estimated. Target discovered the breach on December 13th and notified the justice department.The information stolen included names, mailing addresses, phone numbers and email addresses. The hackers tole 11 Gb worth of personal information. Target said that it will provide one year of free credit monitoring…

    • 442 Words
    • 2 Pages
    Good Essays
  • Good Essays

    There were several breakdowns in Target’s security operations. First, the security system was not compliant to the latest standards nor was the architecture robust enough – too many systems were chained together without defenses between them. Second, Target did not make the changes that were suggested to them on multiple fronts, but instead either ignored them completely or did not implement a plan that would last long. Third, the response to the multiple warnings, from both the monitoring system and the security teams, was not enough in comparison to the severity of the warnings. Like most organizations, Target could not predict the kind of attack that would be executed on them; however, had they responded to any of these problems directly and more carefully, they could have stopped the breach much sooner.3.…

    • 523 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It205 Week 5 Checkpoint

    • 272 Words
    • 2 Pages

    The banks have been affected the most by the stolen data more so than the retailers, the credit card companies or TJX, and may have to pay up to $300 million to recover stolen credit cards in addition to covering fraudulent purchases. TJX is being sued for not protecting their customers’ information and estimates losses at $1 billion over 5 years. The customers have lost trust in TJX and those polled said they would never again shop at the effected retail stores.…

    • 272 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In this article, Bobbie Jean Donnelly was a fraudster who used Travel and Expense reimbursements to defraud her company. Donnelly figured out how to manipulate her travel and expense reimbursements to eventually defraud her company of about $275,000. Had her company had proper controls in place for travel and expense reimbursements, wouldn’t have occurred to this magnitude.…

    • 616 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    During Thanksgiving of 2013, Target had 40 million of its costumer’s credit card data stolen. Hackers remotely installed malware into Target’s security and payments system, which monitored the use of credit cards throughout all 1,797 of Target’s U.S. stores. This data was then stored on a Target server, which the hackers had taken over.…

    • 230 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Target Breach Case Study

    • 346 Words
    • 2 Pages

    Target faced a slew of challenges because of the aftermath of the 2013 data breach which affected up to 70 million consumers personal information (Riley et al., 2014). Most of which could have been prevented if they had the principle managerial functions in place. CEO Greg Steinhafel lacked in many of these areas to which led to his ouster at Target.…

    • 346 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Checkpoint: Tjx Companies

    • 326 Words
    • 2 Pages

    The cost associated with data breaches can be enormous and infinite. A data breach can have severe repercussions including reputational costs to organization and brand. A data breach can also cause the loss of confidence and apprehension in consumer. This in turn will cause less people to shop with TJX companies which can create a loss in revenue. The consumer can also have charges and unauthorized use of their credit information. Banks and issuers of credit and debit cards were forced to replace the stolen cards and refund any money that was stolen due to fraudulent credit or debit charges.…

    • 326 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    From reading the article, I can see where some of Target’s officials made some treacherous mistakes. Even though Target has been business over 50 years, they are still susceptible to the computer hackers of today. So, the main question should be, If Target had everything in place and they were notified of the breech in the security information, why did this happen? (GaleGroup,2014). Was it just pure human error and oversight or was there a bigger failing plan? Nevertheless, CEO Steinhafel, was looking out on behalf of the public consumer, when he chose to tell Americans exactly how many accounts had been possibly hacked instead of allowing his staff to have him report a lower number. (Kinicki & Williams, 2016). He chose to show true integrity…

    • 191 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Target's Attack Model

    • 607 Words
    • 3 Pages

    1. Does Target story follow the general “APT kill chain” attack model? Target’s story follows the general advanced persistent threat attack model. The hackers did the reconnaissance work by finding out Target’s external vendors. Unfortunately, this was easy for the hackers, because Target’s supplier portal and facilities management pages were publicly available information. So, the hackers target Fazio, an external vendor Target used. The hackers then created a targeted “weapon,,” in this case, malware, and sent phishing emails to people at Fazio. Fazio unfortunately did not use from anti-malware software. The hackers gained access to all of Fazio’s usernames and passwords, which allowed access to Target’s systems. The hackers exploited a…

    • 607 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Case Study for Fraud

    • 996 Words
    • 4 Pages

    The amount listed is the enrollment agreement was 10,020.00 which gives a difference of :…

    • 996 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Fraud Case

    • 5971 Words
    • 24 Pages

    Xerox Corporation is a global document management company which manufactures and sells a range of color and black-and-white printers, multifunction systems, photo copiers, digital production printing presses, and related consulting services and supplies. Xerox is headquartered in Norwalk, Connecticut, though its largest population of employees is based in and around Rochester, New York, the area in which the company was founded.…

    • 5971 Words
    • 24 Pages
    Powerful Essays
  • Good Essays

    As Target continues to respond to the security breach that has now been estimated to affect up to 110 million people by NBC News.com, analysts continue to zero in on the statements and actions by CEO, Gregg Steinhafel. And positively so. In the Wall Street Journal article titled, “Target Tried Antitheft Cards,” authors Paul Ziobro and Robin Sidel highlight statements now being made by Steinhafel and actions taken in the past concerning chip-based credit cards. Although the article states that Target pulled the plug on a $40 million, three-year program proposed to better protect shoppers a decade ago, it is apparent that Target may not be to blame.…

    • 439 Words
    • 2 Pages
    Good Essays
  • Good Essays

    As our company is in process of conducting investigation to detect any financial statement fraud or abuse, I have come across the case where expenses were recorded in the financial statement under the period it was disbursed to vendor and actual services occurred in next or other financial year period. It’s against the regulation of SEC and GAAP guidelines. In this particular case the repair were completed in current year and vendor was prepaid for services in full last year financial period, which a violation by recording expenses in the wrong period. No one took the funds and commit fraud but it shows inaccurate expenses and revenue in financial statement for both current and past years. It was done to maintain the repair budget for last year as there was room to spend more last year , so the plant supervisor and purchase manager decided to pay in advance last year and actual services were occurred this year.…

    • 934 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The data breach resulted from Target’s failure to segregate systems handling payment card data from the rest of its network (Bertrand, 2014). The attackers gained access to the company’s network with a username and password stolen from Fazio Mechanical Services who provided refrigeration and HVAC systems for them. With just that information alone, the attackers were able to upload malware programs on Target’s Point of Sale (POS) systems.…

    • 256 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Hacks of this nature do not just have an affect on the targets. Customers also bear some of the burden. Not all of the impacts will be clearly defined or immediately obvious. While credit card companies may reimburse a customer for their stolen money, they do not have the ability to pay for the time the customer spends trying to get their money back, the confidence lost in the security practices of corporations, and most importantly, the emotional impact of dealing with the…

    • 724 Words
    • 3 Pages
    Good Essays