<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p><img src="https://info.threatstop.com/hubfs/0000_Sec_Logo_with_tm.png" alt="0000_Sec_Logo_with_tm.png" width="320" style="width: 320px; display: block; margin-left: auto; margin-right: auto;"></p> <p>Point of Sale (POS) malware is a growing field of concern for the retail industry. From the large scale attack on Target in 2014 to smaller attacks that are going unreported. POS malware is an evolving field of study for security researchers.</p> <!--more--> <p>According to <a href="https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/the-evolution-of-point-of-sale-pos-malware">TrendMicro</a>, The earliest POS malware reported was <strong>RawPOS</strong>, in 2009. This wasn't superseded until 2011 with <strong>Rdasrv</strong>, which was then followed by, or forked into, a variety of new and ever more vicious pieces of malware. With <strong><a href="https://blog.threatstop.com/kasidet-pos-malware-spread-through-fake-security-update">Kasidet</a></strong> being one of the most recent examples.</p> <p>&nbsp;</p> <p><strong>So what is a POS device?</strong></p> <p>POS devices are any endpoint device used to make financial transactions at the point of sale. This may be a cash register, or it may be a card swipe device. While the latter of these are already targeted by <a href="http://dochub.threatstop.com/display/TS/C#C-_cardSkimming">card skimmers</a> they're also vulnerable to firmware attacks. This can, in turn, make an unmodified device into a card skimmer. Registers are also vulnerable, as technology has progressed so has register technology. While standards such as PCI-DSS are in place to protect against fraud, they aren't 100% effective, and malware development has added a new and complicated layer.</p> <p>&nbsp;</p> <p><strong>You mentioned firmware attacks, but how does malware gather data from a POS device?</strong></p> <p>It depends on the malware, to be honest. The simplest method is to sit resident in memory and run scrapes during transactions. Then you buffer batches of card numbers and when no one's looking you send it to your C&amp;C system along with the PIN. This is a technique used by <a href="https://blog.threatstop.com/adding-new-cybercrime-trackers">Alina</a> and its descendants.</p> <p>Other POS malware systems use the litany of standard malware infiltration tactics, Trojans, (Spear) phishing, and so on. This allows them to either go undetected or to appear as a legitimate program on sensitive systems. Then they sit in the background and gather their information before contacting their C&amp;C.</p> <p>&nbsp;</p> <p><strong>What's the potential for damage from a POS device compromise?</strong></p> <p>Bad. After the breach suffered by Target, they were on the hook for $10 million in damages to their customers. The customers also had to take steps in re-securing their personal information. This leaves a bad taste in the customer's mouth and Target did take a knock to their brand for this.</p> <p>For an idea of the type of fallout that you can expect from a massive breach, you can study not only Target but its contemporary <a href="https://arstechnica.com/information-technology/2017/09/why-the-equifax-breach-is-very-possibly-the-worst-leak-of-personal-info-ever/">Equifax</a>. While they weren't affected by POS malware, this breach will have heavy implications for the company.</p> <p>&nbsp;</p> <p><strong>So, how do we protect ourselves?</strong></p> <p>ThreatSTOP has been focusing on POS malware attacks recently. After a good bit of research, we've added two new target lists to our threat protection. Adding these to your ThreatSTOP DNS or IP Firewall device will block exfiltration data. It will also alert you to the presence of compromised devices, which you can then take offline and remediate.</p> <p>Enabling the &nbsp;<strong>TS Curated - POS</strong> targets in your policies for ThreatSTOP DNS and IP Defense Services protects against <strong>POS malware threats</strong>. The <strong>TS Research – POS</strong> targets are also available in Expert mode, and can be added explicitly although they are part of the highly recommended <strong>TS Curated – POS</strong> targets.</p> <p>If you do not have a ThreatSTOP account, &nbsp;for a free trial.</p> <p>If you do have a ThreatSTOP account, instructions to add targets to a <a href="http://dochub.threatstop.com/display/TS/ThreatSTOP+DNS+Firewall#ThreatSTOPDNSFirewall-DNSFWPolicy">DNS</a> or <a href="http://dochub.threatstop.com/display/TS/ThreatSTOP+IP+Firewall">IP</a> Firewall policies are available on the ThreatSTOP Documentation Hub. Or contact our &nbsp;team.</p></span>