ipl-logo

Target's Fraud Case

1072 Words5 Pages

1 Target missed alarms led to 40 million credit card numbers has been stolen.

On Thanksgiving Day 2013, someone installed malware in Target’s (TGT) security and payments system designed to steal every credit card used at the company’s U.S. stores. And when the Christmas gifts had been scanned and bagged and the cashier asked for a swipe, the malware would step in, capture the shopper’s credit card number, and store it on a Target server commandeered by the hackers. Target claimed that the initial breaking- in its systems was traced back to network credentials that were stolen from a third party vendor. The vendor is taking care refrigeration, heating and air conditioning area, it has worked at a number of locations at Target and other top retailers.

Evidence of wrong doing

Firstly, Six months earlier the company began installing a $1.6 million malware detection tool made by Fire Eye- a powerful computer security firm. Target had a team of security specialists in Bangalore to monitor its computers around the clock. If Bangalore noticed anything suspicious, Target’s security operations center in Minneapolis would be notified. On November 30, 2013 the hackers uploaded exfiltration malware …show more content…

All kinds’ people can commit fraud, and for those people who hack in target, probably multiple of pressures motivate them to commit fraud. It could be financial pressures, vices, and other types of pressures. For rationalizations, unlike other fraud, e-commerce fraud is less human contact and interaction, Kunal stated that rationalization enables people to maintain their code of ethics and avoid guilt or self-condemnation. Hackers rationalize themselves that we are not steal cash, we just accessed the date, there is no actual transaction that hurts people, and also the new economy thinking contends that traditional methods of accounting no longer

Open Document