What You Need To Know About The Target Security Breach.

by

January 16, 2014

The CEO of Target revealed their Point-of-Sale (PoS) systems were infected with malware.  This resulted in the massive data breach that occurred over the holiday shopping season. Target’s data breach impacted nearly 110 million shoppers. 

Here’s What Happened.

When a customer swiped their card at the Target PoS terminal to authorize their transaction, the data encoded on the card was temporarily stored in the system’s RAM (random access memory).  It was later read by malware that had been installed on the machine.

Malware programs designed to infect PoS systems are known as RAM scrapers. These programs search terminal’s RAM to steal transaction data.

After Target’s data breach, businesses and customers alike are concerned about memory-scraping malware.

Here What You Need To Know.

  • Memory-Scraping Malware Targets All Types of Organizations.

Retailers aren’t the only targets.  One of the first RAM attacks occurred when PoS systems were compromised at a university and several hotels back in 2011. Any business or organization is at risk.

  • Encryption Won’t Protect You

Memory-scraping malware is designed to target data located in memory where it’s stored in plaintext format. Cybercriminals design memory-scraping malware to read this format.

  • You Can’t Encrypt Data in a PoS System

Unfortunately, it’s not possible to encrypt data in the PoS system memory. Before the system can process any data is must be decrypted in the memory.  Cybercriminals design memory-scraping malware to steal information as soon as this happens.

  • Memory-Scraping Malware Comes in Many Forms

The U.S. Computer Emergency Readiness Team (US-CERT) said two types of memory-scraping malware are currently being used to intercept data:

Dexter—Which deconstructs the memory to find data.

Stardust —Which extracts data from memory and internal network traffic.

  • Unsecured Wireless Networks Provide an Entry Point

PoS systems are network-connected which means any system connected to the network could be an access point for malware. Unsecured wireless networks also provide an entry point for attackers. PoS systems are vulnerable to phishing attacks because malware can jump from an infected PC to a PoS system.

  • Memory-Scraping Malware Is Easy to Hide

If an attacker gains access to the network that connects to PoS systems, it will be difficult to detect the attacks. Attackers often use antivirus evasion techniques to keep the malware hidden.

So, What Should You Do?

Use a Secure PoS Network To Block Memory-Scraping Malware.

The US-CERT recommends employing six security measures to avoid memory-scraping malware attacks:

  1. Use strong passwords to access PoS systems.
  2. Always keep PoS software up to date.
  3. Use firewalls to isolate the PoS production network from the Internet or other networks.
  4. Limit access to the Internet from the production network.
  5. Use up-to-date antivirus tools.
  6. Disable remote access to PoS systems.

It’s essential to stay informed on the latest data breaches and malware used to steal sensitive information. To learn more about memory-scraping malware, give us a call at (888) 330-8808 or send us an email at [email protected]. Integris can help you stay informed about the latest data breaches and types of malware used to steal sensitive information. 

We're Integris. We're always working to empower people through technology.

Keep reading

Bridging the Gap between Automation and Innovation

Bridging the Gap between Automation and Innovation

Automation and Innovation. Some people might say those two words cancel each other out. Yet, I believe these two concepts can create capacity for each other—if your business leverages the free time automation creates to foster innovation. Automation can be...

Hot New Ways to Customize Microsoft Teams for Your Industry in 2024

Hot New Ways to Customize Microsoft Teams for Your Industry in 2024

Nearly everyone with Microsoft Teams knows what a tremendous tool it is for chat, document sharing, and meetings between individuals or large groups. We’re used to using the tool as it appears on our screens daily. But did you know hundreds of integrations available...

Why Is My Laptop Draining So Fast?

Why Is My Laptop Draining So Fast?

Before You Replace Your Laptop Battery, Try These Fixes First Stuck with a laptop that’s running out way before it’s standard 8-10 hours of run time? Don't throw it out just yet.  Try these quick fixes to extend its life: Reduce your screen brightness If possible,...