Unfortunately, something ugly has tarnished the canvases of the artists and crafters who used their debit or credit cards to shop at Michaels from May 8, 2013 to January 24, 2014. In late January 2014, Michaels announced that it was investigating a potential security breach involving customers’ credit card information. After weeks of analysis, Michaels finally confirmed yesterday that a targeted attack did indeed occur on some of their point of sales systems and that approximately 2.6 million cards may have been compromised.
At BitSight, we have observed significant botnet activity on Michael’s network over the past year. In particular, we observed multiple instances of Conficker, a botnet that can completely compromise system confidentiality, integrity, and availability. BitSight also observed multiple instances of Zeus, Defid, ZeroAccess and Neurevt infections. Neurevt is known to steal sensitive data from a compromised machine and to connect to remote servers to enable attacker access to the infected machine. ZeroAccess, also known as max++ and Sirefef, is used for Bitcoin mining, click fraud, and opening backdoors on compromised machines, which allows a remote attacker to gain control of the machine.
As discussed in our January 16th post, many retailers were infected by these malware strains. However, what is particularly disturbing about Michaels is the average length of time between when a security incident was first observed by BitSight to when it was last observed. We call this metric “Event Duration” and use it as a proxy to measure how quickly a company identifies and remediates security incidents. The average event duration over the past year at Michaels is 172% longer than the average of companies in the S&P 500 (excluding telecommunications companies). While the average is 6.7 days, we observed a few Conficker infections that persisted for over 300 days.
There are at least two lessons to be learned here. First, evaluating a company’s security posture from the outside can be just as valuable as examining it from the inside. Whether or not the activity observed by BitSight was indeed related to the breach, the fact is that we did observe increased malicious activity leading up to the breach period. Second, once malware has entered an organization, it can continue to cause harm long after the original incident has been removed. In the case of Michaels, as occurred at Target, the initial infection likely started off elsewhere, and then found its way to the point of sale system.
A company can never be done securing itself. It’s an ongoing process that requires constant monitoring and adaptation. Leonardo da Vinci once said, “Art is never finished, only abandoned.” In this case, security does not seem so different from art.
Cybersecurity is one of the biggest threats to global commerce in the 21st century.
By providing data-driven insights into cybersecurity, we can empower the marketplace to make better, risk-informed decisions and create a more secure...
With the average cost of a data breach in the U.S. reaching nearly $8.6 million, your organization can’t afford to ignore cybersecurity risk. Indeed, the need for security risk management is greater than ever. When cyber risk is managed...
From sensors on the factory floor to those that guide autonomous vehicles, the Internet of Things (IoT) is transforming how we live and work. Over the coming years, IoT will continue to change our world, with the number of connected...
© 2026 BitSight Technologies. All Rights Reserved. | Privacy Policy | Security | For Suppliers
Contact Us | BitSight Technologies | 111 Huntington Ave, Suite 2010, Boston, MA 02199 | +1-617-245-0469