Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 28 May, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Point-of-sale security in a bad state, according to Kaspersky analysis of Backoff

by The Gurus
September 2, 2014
in Editor's News
Share on FacebookShare on Twitter

The success of the Backoff remote access Trojan (RAT) paints a very bleak picture of the state of point-of-sale security, according to Kaspersky Lab.
 
In an evaluation, Kaspersky Lab said that after sinkholing two servers, it has seen more than 85 victims connecting to its sinkhole, and its sinkhole covers less than five per cent of the command and control (C&C) channels.
 
“Taking into account the U.S. Secret Service statement, it’s a pretty safe bet that the number of Backoff infections at businesses in North America is well north of 1,000,” it said.
 
“Since its appearance last year, Backoff has not changed dramatically. The author created both non-obfuscated and obfuscated samples. This was likely done to defeat the security controls on the targeted networks. However, the defences running on a PoS terminal and/or network should not have been affected by this. This speaks volumes about the current state of PoS security, and other cyber criminals are sure to have taken note.”
 
Kaspersky confirmed that it sinkholed two servers that Backoff samples used to communicate with their masters that were compiled between January – March 2014.
 
Dr. Mike Lloyd, CTO of RedSeal, said: “The significance of the so-called ‘Backoff’ malware is that it reminds businesses and consumers that all our infrastructure is connected now. In the past, there were air gaps – ATM machines weren’t on the same network as point of sale devices, and all the banking infrastructure was separate from the power companies.
 
“However, the spread of Internet connectivity (including the Internet of Things) means the old and lazy assumption of ‘you can’t get there from here’ is out the window. Defence is now about controlled network segmentation— making sure you take the trouble to build perimeters around the assets you must defend. This is harder than old-world air gap-based defences, and requires constant oversight to look for holes in the virtual fence.”
 
Jérôme Segura, senior security researcher at Malwarebytes, said: “In late July, the Computer Emergency Readiness Team (US-CERT) issued a warning about the Backoff point-of-sale malware in an effort to provide technical details as well as recommendations for affected businesses. While at the time it wasn’t clear how widespread the problem was, we now know that more than a thousand US companies have been hit since October 2013.
 
“This allows us to connect the dots between the recent data breaches affecting retailers that had one thing in common: The Backoff malware. Attackers relied on insecure networks that could be penetrated through brute force attacks via remote desktop applications. Once in, the Backoff malware, which was invisible to antivirus products, could start burying itself into the system and wait for the next card swipe into the PoS computer.
 
“In addition to keeping their PoS systems updated and running security solutions such as antivirus and anti-malware, companies need to review their remote access policies, segregate their networks and have network traffic tools to detect potential data exfiltration.”

FacebookTweetLinkedIn
ShareTweet
Previous Post

North Korea has cyber attack cells in China, South Korea and Japan, say HP

Next Post

The Con is on in London

Recent News

SnapDragon Monitoring scam advice

Tips to Protect Against Holiday and Airline Scams

May 25, 2023
Access Segmentation & Encryption Management from MyCena

New security model launched to eliminate 95% of cyber breaches

May 25, 2023
KnowBe4 Helps Organisations Battle QR Code Phishing Attacks With New Tool

KnowBe4 Helps Organisations Battle QR Code Phishing Attacks With New Tool

May 25, 2023
Purple Logo, capitalised letters: SALT.

Salt Security Uncovers API Security Flaws in Expo Framework, Issues have been Remediated

May 24, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information