A 17-year-old male from Russia may be the developer of malicious software that was used in the recent Target breach, affecting millions of Target customers and threatening their personal online data this shopping season. According to new evidence, authorities believe that while the Russian teen may have received outside help in creating the technology used behind the cyber attack, the 17-year-old suspect is the primary developer of the malware. Fox News describes more on this breaking report this Sunday, Jan. 19, 2014.
An official document released this Saturday reveals that an unidentified Russian male, only 17 years of age, could be responsible for designing a powerful and threatening software that enabled hackers to steal both private data and credit card numbers from over 70 million potential shoppers. Cyber security company IntelCrawler, based here in the state of California, believes that the BlackPOS malware made by the boy has considerably infected the payment systems of no less than six other major retailers as well.
This Jan. 2014, Neiman Marcus released a statement acknowledging that its personal data systems had also been recently hacked, while the source site confirms that a minimum of three other popular stores — on top of the Target breach and Neiman Marcus cyber attack — might also have been made victims of this online threat. Regarding evidence at the time, authorities were also under the impression that the hackers may have come from somewhere in Eastern Europe, but no official regions had been named at the time.
Now, the IntelCrawler press release has stated the 17-year-old Russian male is a key player in the Target breach, has had his “roots” founded in St. Petersburg, Russia, and is known online by only the screen name, “Ree4.”
“It was the company's CEO, Andrew Komarov, who said that he began investigating the malware last March at the request of banking clients. Komarov stated that the malware had been downloaded at least 60 times since its creation and was being sold by its creator for approximately $2,000, with discounts offered to buyers who agreed to share any ill-gotten profits.”
An investigation by this and other cyber security firms is still continuing this week.