BACKGROUND IMAGE: iSTOCK/GETTY IMAGES
As a retailer, my company uses POS terminals. While we have a number of security controls in place, with the recent surge in POS malware, I am wondering if there are any additional measures we should look at to protect our systems?
Cybercriminals are always looking for opportunities to compromise point-of-sale (POS) terminals. One of the most common methods used for attacks is memory-scraping malware, a type of malware that locates and pilfers sensitive data from the memory of the POS terminal.
Two of the most recent examples of POS malware attackers are Dexter and Kaptoxa. The Dexter malware, which was discovered in December of 2012, infected hundreds of POS systems across multiple countries by injecting itself into the Windows operating systems, staying active through rewriting in the system registry key, scraping sensitive credit card data from the systems, and finally transferring the information to a remote command-and-control system. A year later, the second-largest discount retailer in the U.S. experienced a major data breach due to POS malware. Reports have revealed that Target's POS terminals were infected with Kaptoxa, a variety of RAM-scraping malware. In this breach, attackers were able to harvest the credit card information of more than 40 million customers.
So, what can be done? How can organizations protect themselves and their POS terminals against this potentially disastrous malware?
The retail industry represents a good use case demonstrating how whitelisting technology can effectively provide the protection needed from unauthorized processes running in POS systems used to process financial transactions. Whitelisting is an administrative process that allows only pre-approved applications to execute in a system. It hardens the OS and applications to ensure that executables cannot be deleted, added or modified except by a trusted source. Due to their generally static nature, POS terminals are highly suited to benefit from whitelisting, along with ATMs, kiosks and other terminals that process payment data. Properly implemented, whitelisting in these endpoints not only provides robust security but also satisfies a number of Payment Card Industry Data Security Standard requirements.
So, how should whitelisting be implemented? Obviously, the more stringent the process, the more protection it provides. Enterprises have the option of either employing a third-party whitelisting product or creating their own strategy. When implementing a whitelisting security strategy in POS terminals, various deployment approaches create different levels of success. There are five main phases in a whitelisting project:
- Documenting the requirements
- Designing a strategy
- Testing and validation
Also note that before a whitelisting product is deployed to any production system, a robust testing plan and incident response procedure must be written so that rogue processes or application detects can be called out and responded to quickly in order to minimize the risk and reduce the impact to the business.
Once the testing and validation phase is complete, the whitelisting program can be pushed to production systems through an existing patching system or packaged as part of the OS image for new systems. It is critical that any whitelisting strategy also have reporting and logging features for monitoring and compliance requirements. These will also help ensure that the application is running and is healthy as expected. Additionally, should there be a reporting issue, an alert will notify the appropriate support team to look into and fix the reported issue.
Dig Deeper on Network Access Control technologies
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.