Attacks/Breaches
1/27/2014
11:56 AM
50%
50%

How To Defend Point-Of-Sale Systems

US-CERT gives advice on defending POS systems against attacks like those against Target, Neiman Marcus.

Major hacks at retailers that include Target and Neiman Marcus have put a new spotlight on the security of point of sale (POS) systems. What may come as a surprise to some is that the recent memory-scraping malware attacks were nothing new. Last year, Visa published two "Visa Data Security Alerts" warning merchants of an increase in attacks targeting credit card data with specific references to memory-scraping malware.

The alerts were published in April and August. The first stated that Visa has seen an increase in network intrusions involving grocery merchants since January 2013. August's update used nearly the same verbiage but mentioned retail instead of grocery. The part that's of particular interest is how the attackers were carrying out the attacks.

"Once inside the merchant's network, the hacker will install memory parser malware on the Windows based cash register system in each lane or on Back-of-the-House (BOH) servers to extract full magnetic stripe data in random access memory (RAM)."

Read the rest of this story on Dark Reading.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
rfairfield926
50%
50%
rfairfield926,
User Rank: Apprentice
1/28/2014 | 12:39:19 PM
Reference material from another source
Why do I access the InformationWeek website to be referred to the DarkReading website to get to the article material?
Laurianne
50%
50%
Laurianne,
User Rank: Apprentice
1/28/2014 | 1:14:50 PM
Re: Reference material from another source
rfairfield, that is a fair question. We at InformationWeek pick up articles from our sister site, Dark Reading, when we feel the articles will be especially valuable to our audience. I realize it requires an extra click to get through to the full article. Thanks for your patience -- Laurianne
jimstout7878
50%
50%
jimstout7878,
User Rank: Apprentice
4/25/2014 | 1:42:47 PM
Agreed
It is amazing how hackers have been able to get into some of the largest databases in the world. A lot of people are on edge right now with their compromised security. Hopefully the Government can set up better defenses in the future.

 

 http://www.remsinc.com/Rems/index.aspx
anon9919459337
50%
50%
anon9919459337,
User Rank: Apprentice
5/9/2014 | 1:24:30 PM
Memory-Scraping
I didn't realize that memory-scraping malware was so common. I tend to take more precautions than most people when it comes to my personal information. I had my identity stolen once and that is where I drew the line and decided tha tI wouldn't let it happen again.

Jason|http://mbccash.com/ncr-silver-pos-point-of-sale/
Register for Dark Reading Newsletters
Dark Reading Live EVENTS
INsecurity - For the Defenders of Enterprise Security
A Dark Reading Conference
While red team conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense; the blue team will be the focus.
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: No, no, no! Have a Unix CRON do the pop-up reminders!
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.