Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Buckeye McFrog
How would malware get into the POS system?

According to the article, they were able to compromise a web server to gain access to the network. From there they could deploy the malicious code to the POS devices and also set up a data collection point on another one of Target's servers. The malicious code on the POS devices would send the credit card data to this collection point as the card was swiped. The bad guys were able to log on to the collection server to gather the data whenever they felt like it.

11 posted on 01/16/2014 9:03:16 AM PST by BlueMondaySkipper (Involuntarily subsidizing the parasite class since 1981)
[ Post Reply | Private Reply | To 2 | View Replies ]


To: BlueMondaySkipper
"The malicious code on the POS devices would send the credit card data to this collection point as the card was swiped. The bad guys were able to log on to the collection server to gather the data whenever they felt like it."

I guess the net admins never heard of router security protocols. There shouldn't be open routes (unauthorized IP addresses) between internal servers. We can rest easy at night that our grid is just a secure.

17 posted on 01/16/2014 9:54:07 AM PST by uncommonsense (Liberals see what they believe; Conservatives believe what they see.)
[ Post Reply | Private Reply | To 11 | View Replies ]

To: BlueMondaySkipper

Wimpy userids and passwords.

We had a break-in on a box and my Server2008 box was audited because the pwn3d server tried to get in. When I told them my only local user id, they responded “How did you think of something that convoluted?”.

I guess the same way you thought of using “fred” as a local acct on your server.
Now the server emails me for every incorrect login.


20 posted on 01/16/2014 10:03:41 AM PST by AppyPappy (Obama: What did I not know and when did I not know it?)
[ Post Reply | Private Reply | To 11 | View Replies ]

To: BlueMondaySkipper
From there they could deploy the malicious code to the POS devices...

I'll say! Actually I do. Devices that are targets for this kind of attack shouldn't be able to be remotely flashed with new software. It's convenient for the people who manage them, but so what, it's not their money to be putting at risk.

44 posted on 01/16/2014 2:58:47 PM PST by Still Thinking (Freedom is NOT a loophole!)
[ Post Reply | Private Reply | To 11 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson