How about this? https://www.sans.org/reading-room/whitepapers/casestudies/case-study-critical-controls-prevented-target-breach-35412
And no, it had nothing to do with z/OS or Dynalloc. -----Ursprüngliche Nachricht----- Von: IBM Mainframe Assembler List [mailto:ASSEMBLER-LIST@LISTSERV.UGA.EDU] Im Auftrag von Walt Farrell Gesendet: Samstag, 23. Dezember 2017 18:10 An: ASSEMBLER-LIST@LISTSERV.UGA.EDU Betreff: Re: Dynalloc (was Macro processor) On Fri, 22 Dec 2017 21:26:07 +0000, Jon Perryman <jperr...@pacbell.net> wrote: >Charles broke the cardinal rule in security ( never say never ). Viruses rely >on dynalloc. This vulnerability was used against Target where they >were >recently fined $18 million and lost millions in revenues for their data >breach. Can you point to reports that talk about how the Target breach occurred? I have not seen any descriptions of it publicly that could allow one to draw the conclusions you've made. (I'm assuming, by the way, that you don't literally mean that z/OS, and dynalloc, were involved. If you do mean that, the reports should also specifically describe the system that was breached, the OS, etc.) -- Walt