Attacks/Breaches

1/27/2014
11:56 AM
50%
50%

How To Defend Point-Of-Sale Systems

US-CERT gives advice on defending POS systems against attacks like those against Target, Neiman Marcus.

Major hacks at retailers that include Target and Neiman Marcus have put a new spotlight on the security of point of sale (POS) systems. What may come as a surprise to some is that the recent memory-scraping malware attacks were nothing new. Last year, Visa published two "Visa Data Security Alerts" warning merchants of an increase in attacks targeting credit card data with specific references to memory-scraping malware.

The alerts were published in April and August. The first stated that Visa has seen an increase in network intrusions involving grocery merchants since January 2013. August's update used nearly the same verbiage but mentioned retail instead of grocery. The part that's of particular interest is how the attackers were carrying out the attacks.

"Once inside the merchant's network, the hacker will install memory parser malware on the Windows based cash register system in each lane or on Back-of-the-House (BOH) servers to extract full magnetic stripe data in random access memory (RAM)."

Read the rest of this story on Dark Reading.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
anon9919459337
50%
50%
anon9919459337,
User Rank: Apprentice
5/9/2014 | 1:24:30 PM
Memory-Scraping
I didn't realize that memory-scraping malware was so common. I tend to take more precautions than most people when it comes to my personal information. I had my identity stolen once and that is where I drew the line and decided tha tI wouldn't let it happen again.

Jason|http://mbccash.com/ncr-silver-pos-point-of-sale/
jimstout7878
50%
50%
jimstout7878,
User Rank: Apprentice
4/25/2014 | 1:42:47 PM
Agreed
It is amazing how hackers have been able to get into some of the largest databases in the world. A lot of people are on edge right now with their compromised security. Hopefully the Government can set up better defenses in the future.

 

 http://www.remsinc.com/Rems/index.aspx
Laurianne
50%
50%
Laurianne,
User Rank: Apprentice
1/28/2014 | 1:14:50 PM
Re: Reference material from another source
rfairfield, that is a fair question. We at InformationWeek pick up articles from our sister site, Dark Reading, when we feel the articles will be especially valuable to our audience. I realize it requires an extra click to get through to the full article. Thanks for your patience -- Laurianne
rfairfield926
50%
50%
rfairfield926,
User Rank: Apprentice
1/28/2014 | 12:39:19 PM
Reference material from another source
Why do I access the InformationWeek website to be referred to the DarkReading website to get to the article material?
Weaponizing IPv6 to Bypass IPv4 Security
John Anderson, Principal Security Consultant, Trustwave Spiderlabs,  6/12/2018
'Shift Left' & the Connected Car
Rohit Sethi, COO of Security Compass,  6/12/2018
Why CISOs Need a Security Reality Check
Joel Fulton, Chief Information Security Officer for Splunk,  6/13/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10617
PUBLISHED: 2018-06-18
Delta Electronics Delta Industrial Automation DOPSoft version 4.00.04 and prior utilizes a fixed-length heap buffer where a value larger than the buffer can be read from a .dpa file into the buffer, causing the buffer to be overwritten. This may allow remote code execution or cause the application t...
CVE-2018-10621
PUBLISHED: 2018-06-18
Delta Electronics Delta Industrial Automation DOPSoft version 4.00.04 and prior utilizes a fixed-length stack buffer where a value larger than the buffer can be read from a .dpa file into the buffer, causing the buffer to be overwritten. This may allow remote code execution or cause the application ...
CVE-2018-10623
PUBLISHED: 2018-06-18
Delta Electronics Delta Industrial Automation DOPSoft version 4.00.04 and prior performs read operations on a memory buffer where the position can be determined by a value read from a .dpa file. This may cause improper restriction of operations within the bounds of the memory buffer, allow remote co...
CVE-2015-4664
PUBLISHED: 2018-06-18
An improper input validation vulnerability in CA Privileged Access Manager 2.4.4.4 and earlier allows remote attackers to execute arbitrary commands.
CVE-2018-9021
PUBLISHED: 2018-06-18
An authentication bypass vulnerability in CA Privileged Access Manager 2.8.2 and earlier allows remote attackers to execute arbitrary commands with specially crafted requests.