Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: BlueMondaySkipper

How would malware get into the POS system?
You can’t use a cash register to go surfing on porn.com


2 posted on 01/16/2014 8:44:58 AM PST by Buckeye McFrog
[ Post Reply | Private Reply | To 1 | View Replies ]


To: Buckeye McFrog

Apparently, Target’s POS terminals are networked.

Here’s the analysis of the malware, and from that you can clearly see that the terminal must be running Windows and be capable of connecting to the internet:

http://krebsonsecurity.com/wp-content/uploads/2014/01/POSWDS-ThreatExpert-Report.pdf


7 posted on 01/16/2014 8:51:26 AM PST by Boogieman
[ Post Reply | Private Reply | To 2 | View Replies ]

To: Buckeye McFrog

Because they all talk to a central computer.

SkyNet is everywhere.


8 posted on 01/16/2014 8:51:28 AM PST by Valpal1 (If the police can t solve a problem with violence, they ll find a way to fix it with brute force)
[ Post Reply | Private Reply | To 2 | View Replies ]

To: Buckeye McFrog
How would malware get into the POS system?

According to the article, they were able to compromise a web server to gain access to the network. From there they could deploy the malicious code to the POS devices and also set up a data collection point on another one of Target's servers. The malicious code on the POS devices would send the credit card data to this collection point as the card was swiped. The bad guys were able to log on to the collection server to gather the data whenever they felt like it.

11 posted on 01/16/2014 9:03:16 AM PST by BlueMondaySkipper (Involuntarily subsidizing the parasite class since 1981)
[ Post Reply | Private Reply | To 2 | View Replies ]

To: Buckeye McFrog

I’d guess the glory of the network, the POS computers talk to local servers to update inventory and other stuff, those servers talk to WAN servers to meta all that data, and those servers can connect to other server that run basic parts of the network, which in turn are talked to by laptops run by office drones that surf porn at work. Nobody keeps domains separate anymore, creates too much work when the same stuff (like Office apps) are needed in multiple domains, they setup lots of two-way trusts and viruses spread.


22 posted on 01/16/2014 10:13:14 AM PST by discostu (I don't meme well.)
[ Post Reply | Private Reply | To 2 | View Replies ]

To: Buckeye McFrog
How would malware get into the POS system? You can’t use a cash register to go surfing on porn.com

POS endpoints have to be connected, otherwise they could now work to verify credit cards. usually such embedded devices have minimal OS and network services so there aren't a lot of weak processes to try to take over. However they probably have a mechanism to upgrade/patch the software on them remotely, and to do that you generally need a port that can push software in. That might be a way the attackers got in.

One trick they use is to send data that's way too big for the buffer (sort of like the "inbox") so that the data overflows into areas of memory it's not supposed to go to. That can crash the system and force a reboot and if you planted bad stuff on it, it will load at the reboot. Really clever hackers can do far more.

26 posted on 01/16/2014 10:26:14 AM PST by pepsi_junkie (Who is John Galt?)
[ Post Reply | Private Reply | To 2 | View Replies ]

To: Buckeye McFrog

Looks like the hackers breached a web server and then logged onto POS servers which control the POS devices. What’s disturbing is that the hackers had a persistent connection and periodically downloaded data.


29 posted on 01/16/2014 10:47:45 AM PST by BuckeyeTexan (There are those that break and bend. I'm the other kind. ~Steve Earle)
[ Post Reply | Private Reply | To 2 | View Replies ]

To: Buckeye McFrog

If it’s on a network, it can be hacked. And recently, it has been alleged that the NSA can hack even an offline machine that had been previously compromised.


35 posted on 01/16/2014 1:12:00 PM PST by SgtHooper (If at first you don't succeed, skydiving is not for you.)
[ Post Reply | Private Reply | To 2 | View Replies ]

To: Buckeye McFrog
"How would malware get into the POS system?"

If the POS is running on top of a vulnerable Windows OS, all too easy. All it takes is one compromised machine on a network, and it can be used as an attack platform to target other machines that can be exploited. Pretty soon, the attacker 'owns' the place.

57 posted on 01/17/2014 2:12:43 AM PST by KoRn (Department of Homeland Security, Certified - "Right Wing Extremist")
[ Post Reply | Private Reply | To 2 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson