POS system: Point
of Sale systems are used at the point of transaction in retail, consisting of hardware and
software used to process consumer information off credit or debit cards.
When the consumer uses a card in a POS system, the card’s magnetic stripe is read, data (PIN Block) is encrypted and sent for approval to the merchant gateway which uses an HSM (Hardware Security Module) to decrypt the PIN Block, re-encrypt it and send it to the bank which confirms the PIN is correct. The confirmation is communicated back to the POS which approves the transaction.
When the consumer uses a card in a POS system, the card’s magnetic stripe is read, data (PIN Block) is encrypted and sent for approval to the merchant gateway which uses an HSM (Hardware Security Module) to decrypt the PIN Block, re-encrypt it and send it to the bank which confirms the PIN is correct. The confirmation is communicated back to the POS which approves the transaction.
Source: citoc.com |
Software attacks are usually performed with a malware called
memory scrapper, which looks at data dumps and filters through them to find the
necessary info.
Lately, more sophisticated attacks have emerged such as Dexter,
Alina and Stardust (a variant of Dexter). The latest form of attack has baffled security
experts, this is the code responsible for the Target breach, BlackPOS.
What distinguishes BlackPOS from a memory scrapper is that it runs in the memory of the system, specifically customized to the organization it infiltrates (Target’s home-grown systems).
It also has specific hooking points and it performs encryptions in the process of exporting data, in order to avoid detection systems. BlackPOS also features extensive anti-forensic and cleanup modules that allow it to successfully infiltrate machines which carry POS software without leaving any traces.
What distinguishes BlackPOS from a memory scrapper is that it runs in the memory of the system, specifically customized to the organization it infiltrates (Target’s home-grown systems).
It also has specific hooking points and it performs encryptions in the process of exporting data, in order to avoid detection systems. BlackPOS also features extensive anti-forensic and cleanup modules that allow it to successfully infiltrate machines which carry POS software without leaving any traces.
No comments:
Post a Comment
Did you find our blog useful? Let us know! We would love to hear your thoughts, opinions and comments regarding any of our blog posts.