Story image

Point-of-sale malware attacks still strong in 2016

02 Mar 2016

Point-of-sale breaches continue to make headlines in the IT world, and according to Carbon Black, the trend isn’t going anywhere in 2016.

Christopher Strand, PCIP, senior director of Compliance and Governance for Carbon Black, says there are a number of factors the are contributing to POS attacks. 

1. Strand says the pressure to adopt EMV technology will continue to draw attention.

“Although most statistics point to full EMV adoption not taking place until well into 2017 or 2018, attackers will be free to take advantage of retailers in the process of implementing these devices,” he explains.

“Rushed or partial deployments that leave the PoS infrastructure unprepared to run EMV properly, along with customer and merchant confusion, will make this situation ripe for savvy attackers.”

2. Attackers will continue to target ill-prepared PoS systems.

Although the vulnerabilities are well-documented, organisations continue to struggle with their security hygiene, so that issues such as lax security configurations and weak passwords will leave many vulnerable to attack, Strand says.

“As a result, cybercriminals will continue to breach PoS environments using variants of the same malware that we’ve seen used for past breaches.”

3. The continued use of unsupported popular PoS operating systems will also leave merchants vulnerable to attack.

“During the past two years, three popular Windows operating systems – two of which are directly related to many major PoS platforms (Win XP and XP embedded) – reached their end-of-life,” says Strand.

“The vulnerabilities of these systems are still being discovered, creating another dimension of IT security risk that many merchants are failing to consider seriously.”

4. Mobile payments and e-commerce widen the threat window.

According to Strand, new ‘card not present’ scenarios may present unfamiliar threats to organisations, and 2016 is likely to see an increasing number of threats targeting other types of payment systems.

5. Increasingly complex regulatory environments will present new challenges to merchants.

“We can expect to see more regulations, fines and other consequences associated with payment systems as the community responds to continued threats,” Strand says.

“This is something for every merchant or payment provider to consider, and it may be time to re-assess their security policies and ability to enforce these.”

Strand says many who think they are not subject to the scrutiny of particular regulations and mandates may find they are now accountable.

6. An increasing awareness of security will lead to more sophisticated PoS malware.

Strand says as more merchants embrace the inevitability of cyber-attacks, malware authors will boost their efforts to stay under the radar and outflank security tools.

He says new PoS malware will target different segments of an organisation’s environment that may be outside the conventional areas of attack.

“While this approach is not as fast and easy for the attacker, it is generally more difficult to detect,” Strand explains.

“Malware authors are taking advantage of known exploit vectors found across enterprise systems, as well as intelligence on what has worked against PoS and payment systems,” he says.

“Clearly PoS and payment providers will need to build allegiances and share information more than ever in 2016.”

Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.
How blockchain could help stop video piracy in its tracks
An Australian video tech firm has successfully tested a blockchain trial that could end up being a welcome relief for video creators and the fight against video piracy.
IBM X-Force Red & Qualys introduce automated patching
IBM X-Force Red and Qualys are declaring a war on unpatched systems, and they believe automation is the answer.
Micro Focus acquires Interset to improve predictive analytics
Interset utilises user and entity behavioural analytics (UEBA) and machine learning to give security professionals what they need to execute threat detection analysis.
Raising the stakes: McAfee’s predictions for cybersecurity
Security teams and solutions will have to contend with synergistic threats, increasingly backed by artificial intelligence to avoid detection.
Exclusive: Ping Identity on security risk mitigation
“Effective security controls are measured and defined by the direct mitigation of inherent and residual risk.”
CylancePROTECT now available on AWS Marketplace
Customers now have access to CylancePROTECT for AI-driven protection across all Windows, Mac, and Linux (including Amazon Linux) instances.