How about this?

https://www.sans.org/reading-room/whitepapers/casestudies/case-study-critical-controls-prevented-target-breach-35412

And no, it had nothing to do with z/OS or Dynalloc.



-----Ursprüngliche Nachricht-----
Von: IBM Mainframe Assembler List [mailto:ASSEMBLER-LIST@LISTSERV.UGA.EDU] Im 
Auftrag von Walt Farrell
Gesendet: Samstag, 23. Dezember 2017 18:10
An: ASSEMBLER-LIST@LISTSERV.UGA.EDU
Betreff: Re: Dynalloc (was Macro processor)

On Fri, 22 Dec 2017 21:26:07 +0000, Jon Perryman <jperr...@pacbell.net> wrote:

>Charles broke the cardinal rule in security ( never say never ). Viruses rely 
>on dynalloc. This vulnerability was used against Target where they >were 
>recently fined $18 million and lost millions in revenues for their data 
>breach. 

Can you point to reports that talk about how the Target breach occurred? I have 
not seen any descriptions of it publicly that could allow one to draw the 
conclusions you've made.

(I'm assuming, by the way, that you don't literally mean that z/OS, and 
dynalloc, were involved. If you do mean that, the reports should also 
specifically describe the system that was breached, the OS, etc.)

-- 
Walt

Reply via email to