Comment Re:Software that Target uses (Score 1) 213
There is a case study on Target on the Microsoft website. That should point you in the right direction. I am sure I will get flamed for this, but Target is a victim as well here. They were attacked by criminals, and determined ones. I don't think the OS/Software version is what hurt them, I think the fact that they were not using encrypted terminals was the mistake. If you compromise a network, how hard is it to get malware that scrapes memory? A good regex that searches for PANs in POS process space seems like it would be very effective. POS vendors are supposed to make sure their software is handling card data securely, but they trust the OS they are running on. I would love to comment more....
Hopefully it will come out what happened, but most likely it was similar to TJX. Some misconfigured wireless or something to that effect. Get on the network, find some vulnerable systems. Pivot, Find the server that the POS boots of off. Infect. Site back and wait.
As for the PIN data. I am not too worried.