Target hackers may take years to track down
Cyber criminals likely live overseas, making extradition and prosecution difficult, U.S. Secret Service says
WASHINGTON— U.S. Secret Service investigators say they are close to gaining a full understanding of the methods hackers used to breach Target’s computer systems last December.
But the agency says it could take years to identify the criminals who stole some 40,000 debit and credit card numbers of Target shoppers and other personal information from as many as 70 million people in the pre-Christmas breach.
And it may take even longer to bring the offenders to justice. The federal investigation is complicated by the international nature of highprofile digital heists. The perpetrators are likely located overseas, which makes extradition and prosecution difficult. As a result, the Secret Service is focused on monitoring the online activities of its suspects, in hopes that they’ll be able to arrest them at an opportune moment, says Ari Baranoff, an assistant special agent in charge with the Secret Service’s criminal investigative division.
“We take a lot of pride in having a lot of patience,” Baranoff said. “There are individuals we’ve apprehended that we’ve known about for 10 years and we’re very comfortable indicting these individuals, sitting back and waiting patiently until the opportu- nity arrives that we can apprehend them.”
Target says it can’t yet estimate what the breach will cost the company, but some analysts put it at close to half a billion dollars. The total cost of the breach — which also would include losses incurred by banks, consumers and others — could easily reach into the billions of dollars.
Target, which is in the midst of its own investigation, has said very little about how the breach happened, except that it believes the thieves gained entry to its systems by infiltrating computers owned by one of its vendors, thought to be a Pittsburgh-area heating and refrigeration business.
Baranoff wouldn’t speak specifically about the federal investigation into the Target breach, since the case is ongoing, but he talked candidly about the growing threat of largescale, financially motivated cybercrimes.
Behind every major breach, there’s usually a team of highly specialized cybercriminals who mainly know each other through online nicknames and reputations. Most aren’t motivated by politics, just greed, Baranoff says.
If the hackers do invest in anything, it’s their own operations. An increasing number are building their own server farms, sometimes leasing space to other criminals, making it harder for law enforcement to track them down. Further complicating matters, Baranoff says the vast majority of highlevel cybercriminals tend to be Russian speakers based in former Soviet and Eastern European countries, which largely puts them out of the reach of U.S. authorities. But the Secret Service has strong ties with cybercrime agencies in many countries — including the Netherlands, Germany and the United Kingdom — and has found others to be helpful as well, even if they don’t have extradition treaties with the United States. Chester Wisniewski, senior security adviser for the computer security firm Sophos, says it’s the Secret Service’s ability to co-ordinate with law enforcement agencies around the world that make it effective in fighting cybercrime and help speed things up.
“With electronic crime, criminals move extremely fast and they’re dependent on the police being tied up in red tape,” Wisniewski says.
But challenges remain. After years of work, agents might be able to shut down a message board where stolen credit card numbers are bought and sold, but there’s nothing to stop another from replacing it the next day, he says.
Meanwhile, political and economic pressure on countries known to harbour cybercriminals can also help, Wisniewski says, noting that U.S. promises of a better trade status helped eliminate much of the cybercrime that previously originated in Romania.
Despite all of that, many countries, including Russia, follow an unwritten rule: they won’t pursue cybercriminals as long as they don’t commit crimes in their own countries, Wisniewski says.
Baranoff says criminals could evade U.S. capture indefinitely if they stay hunkered down in their homes, but they’re generally not happy staying put and like to spend their ill-gotten gains on trips to countries friendly to the U.S. That’s when authorities can make their move.
“These actors are making a lot of money and they want to travel,” Baranoff says. “Some have suggested that there’s no greater punishment actually than forcing them to stay where they are.”