The Target malware stole 11GB of payment card data, according to another analysis by security firm Seculert. It stayed quiet for six days, then moved the data onto another computer in Target's network.
The data was then sent to another server that had been hacked located in the U.S. before it was transmitted again to a virtual private server (VPS) in Russia, likely another proxy, said Aviv Raff, Seculert's CTO, in an interview last week.
Send news tips and comments to firstname.lastname@example.org. Follow me on Twitter: @jeremy_kirk