3 Questions about Oracle’s breach that you are too afraid to ask
Point of Sale data breaches are one of the biggest sources of stolen payment cards for cybercriminals. Attackers have honed their methods, paving the way for the mega-breaches of Target, Home Depot, Michaels and more which compromised approximately 100 million payment cards in the US in 2013-2014.
Last week we were alerted to a data breach at Oracle’s MICROS Point-of-Sale Division. MICROS is among the top three point-of-sale vendors worldwide. It is estimated that Oracle’s MICROS’s systems are deployed at over 100,000 retail sites, 200,000+ food and beverage locations, and more than 30,000 hotels. According to Avivah Litan, a fraud analyst at Gartner Inc – she would say there’s a big chance that the hackers in this case found a way to get remote access to MICROS customers’ on-premises point-of-sale devices.
3 Questions about Oracle’s Breach that you are too afraid to ask
- How long was Oracle’s MICROS customer support portal compromised? Days? Weeks? Months? Years?
- With over 230,000 locations compromised, how many customers were effected? Will we ever know?
- Did the hackers upload card-stealing malware to some customer point-of-sale systems and have they been discovered yet?
With SECDO’s powerful visualization and investigation technology, a company can asses the “who, what, where, when, and how” of an incident and ensure future threats are caught and remediated ASAP. Learn more here.