Attacks/Breaches
1/27/2014
11:56 AM
50%
50%

How To Defend Point-Of-Sale Systems

US-CERT gives advice on defending POS systems against attacks like those against Target, Neiman Marcus.

Major hacks at retailers that include Target and Neiman Marcus have put a new spotlight on the security of point of sale (POS) systems. What may come as a surprise to some is that the recent memory-scraping malware attacks were nothing new. Last year, Visa published two "Visa Data Security Alerts" warning merchants of an increase in attacks targeting credit card data with specific references to memory-scraping malware.

The alerts were published in April and August. The first stated that Visa has seen an increase in network intrusions involving grocery merchants since January 2013. August's update used nearly the same verbiage but mentioned retail instead of grocery. The part that's of particular interest is how the attackers were carrying out the attacks.

"Once inside the merchant's network, the hacker will install memory parser malware on the Windows based cash register system in each lane or on Back-of-the-House (BOH) servers to extract full magnetic stripe data in random access memory (RAM)."

Read the rest of this story on Dark Reading.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
rfairfield926
50%
50%
rfairfield926,
User Rank: Apprentice
1/28/2014 | 12:39:19 PM
Reference material from another source
Why do I access the InformationWeek website to be referred to the DarkReading website to get to the article material?
Laurianne
50%
50%
Laurianne,
User Rank: Apprentice
1/28/2014 | 1:14:50 PM
Re: Reference material from another source
rfairfield, that is a fair question. We at InformationWeek pick up articles from our sister site, Dark Reading, when we feel the articles will be especially valuable to our audience. I realize it requires an extra click to get through to the full article. Thanks for your patience -- Laurianne
jimstout7878
50%
50%
jimstout7878,
User Rank: Apprentice
4/25/2014 | 1:42:47 PM
Agreed
It is amazing how hackers have been able to get into some of the largest databases in the world. A lot of people are on edge right now with their compromised security. Hopefully the Government can set up better defenses in the future.

 

 http://www.remsinc.com/Rems/index.aspx
anon9919459337
50%
50%
anon9919459337,
User Rank: Apprentice
5/9/2014 | 1:24:30 PM
Memory-Scraping
I didn't realize that memory-scraping malware was so common. I tend to take more precautions than most people when it comes to my personal information. I had my identity stolen once and that is where I drew the line and decided tha tI wouldn't let it happen again.

Jason|http://mbccash.com/ncr-silver-pos-point-of-sale/
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0196
Published: 2015-06-29
CRLF injection vulnerability in IBM WebSphere Commerce 6.0 through 6.0.0.11 and 7.0 before 7.0.0.8 Cumulative iFix 2 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL.

CVE-2015-0545
Published: 2015-06-29
EMC Unisphere for VMAX 8.x before 8.0.3.4 sets up the Java Debugging Wire Protocol (JDWP) service, which allows remote attackers to execute arbitrary code via unspecified vectors.

CVE-2015-1900
Published: 2015-06-29
IBM InfoSphere DataStage 8.1, 8.5, 8.7, 9.1, and 11.3 through 11.3.1.2 on UNIX allows local users to write to executable files, and consequently obtain root privileges, via unspecified vectors.

CVE-2014-4768
Published: 2015-06-28
IBM Unified Extensible Firmware Interface (UEFI) on Flex System x880 X6, System x3850 X6, and System x3950 X6 devices allows remote authenticated users to cause an unspecified temporary denial of service by using privileged access to enable a legacy boot mode.

CVE-2014-6198
Published: 2015-06-28
Cross-site request forgery (CSRF) vulnerability in IBM Security Network Protection 5.3 before 5.3.1 allows remote attackers to hijack the authentication of arbitrary users.

Dark Reading Radio
Archived Dark Reading Radio
Marc Spitler, co-author of the Verizon DBIR will share some of the lesser-known but most intriguing tidbits from the massive report