1 00:00:01,210 --> 00:00:03,340 Let's now take a look at the blah blah program 2 00:00:06,440 --> 00:00:11,780 the software was designed to monitor the data passing through TJX his computer network to sniff out 3 00:00:11,780 --> 00:00:16,230 credit card numbers from the corporation. 4 00:00:16,290 --> 00:00:20,170 The sniffer was later used to steal credit card details from other companies. 5 00:00:22,120 --> 00:00:27,530 A Cuban-American Helberg Gonzalez was the mastermind behind the attack. 6 00:00:29,010 --> 00:00:35,290 Gonzales had been recognized as an expert in the computer system security field before he decided to 7 00:00:35,290 --> 00:00:36,810 set up his own business. 8 00:00:36,820 --> 00:00:39,460 He was also working for several government institutions 9 00:00:42,250 --> 00:00:47,800 Gonzales said about his business by first asking his friend Stephen want to create the bloodless scanner 10 00:00:50,400 --> 00:00:57,410 any viruses and intrusion detection systems failed because blah blah was custom designed. 11 00:00:57,570 --> 00:01:03,450 The software was installed in a TJX network and stole 45 million credit card numbers in two months time 12 00:01:05,840 --> 00:01:08,110 the attack was a huge success. 13 00:01:08,190 --> 00:01:11,180 But let's also pay attention to something that happened in the aftermath 14 00:01:14,670 --> 00:01:19,240 TJX was able to keep their customer base. 15 00:01:19,270 --> 00:01:25,020 The company detected the intrusion after a few months inform their customers of the data breach. 16 00:01:25,860 --> 00:01:34,990 And even paid millions in damages the attack however did not make the business collapse in the following 17 00:01:34,990 --> 00:01:39,670 year record sales and earnings were announced. 18 00:01:39,680 --> 00:01:46,930 This means that we as customers can and will forgive a company when our transaction details including 19 00:01:46,930 --> 00:01:52,560 personal information are poorly protected or compromised. 20 00:01:52,660 --> 00:01:54,440 We'll return to this subject later. 21 00:01:57,280 --> 00:02:05,620 STEPHEN LONG over Gonzales and other members of the conspiracy were arrested and charged pleaded guilty 22 00:02:05,620 --> 00:02:08,870 and has to pay $170 million in restitution. 23 00:02:11,020 --> 00:02:17,410 Albert Gonzalez as the brains and leader of the operation is serving a 25 year prison sentence and will 24 00:02:17,410 --> 00:02:20,170 have to pay $70 million in damages. 25 00:02:24,230 --> 00:02:29,250 Another story worth mentioning is the exploits connected to ads for Chinese penis enlargement pills 26 00:02:31,530 --> 00:02:36,770 a virus dubbed storm worm was created in 2007 and spread as an attachment to e-mails. 27 00:02:38,630 --> 00:02:42,650 If it was launched the woman had a computer and merged it into a zombie net. 28 00:02:45,260 --> 00:02:47,990 Affected machines send penis enlargement spam Mad's 29 00:02:51,750 --> 00:02:56,430 online and businesses are paid for redirected visitor clicks on one of the banners on a page 30 00:03:01,070 --> 00:03:04,730 storm creators made several thousand dollars a day in this way. 31 00:03:05,820 --> 00:03:09,240 And there was always the chance that someone would actually buy they advertise product 32 00:03:12,140 --> 00:03:14,730 a group behind the attack made funding them harder. 33 00:03:15,860 --> 00:03:20,210 Because it attacked the servers of all the anti-virus companies that blocked attachments containing 34 00:03:20,210 --> 00:03:24,810 the virus. 35 00:03:24,830 --> 00:03:27,770 That's it for an overview on different types of cyber criminals.