Electronic payments have started to outnumber cash transactions, and hackers have taken notice -- with an increased number of point-of-sale (POS) system breaches making the headlines.
Identify Viable Targets
Identify viable targets for a breach.
After determining what assets they have obtained, hackers will likely then move to see if there were any viable targets in their catch. That is, if there were any major or minor retailers they gained data from during the attack.
They will then typically pick the biggest retailer and start working toward their objectives – compromising the corresponding POS terminals.
Image courtesy of digitalart at FreeDigitalPhotos.net