{"id":71320,"date":"2014-08-05T13:17:40","date_gmt":"2014-08-05T17:17:40","guid":{"rendered":"http:\/\/rbach.net\/blog\/index.php\/"},"modified":"2021-07-20T11:49:43","modified_gmt":"2021-07-20T15:49:43","slug":"remote-desktop-open-door-to-pos-malware","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/remote-desktop-open-door-to-pos-malware\/","title":{"rendered":"Remote Desktop Opens Door to POS Malware"},"content":{"rendered":"<p><a href=\"https:\/\/www.ecvv.com\/product\/4330896.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-98600 \" title=\"Remote Desktop Opens Door to POS Malware\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/all_in_one_pos.jpg?resize=109%2C107&#038;ssl=1\" alt=\"Remote Desktop Opens Door to POS Malware\" width=\"109\" height=\"107\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/all_in_one_pos.jpg?resize=150%2C147&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/all_in_one_pos.jpg?resize=75%2C73&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/all_in_one_pos.jpg?w=498&amp;ssl=1 498w\" sizes=\"auto, (max-width: 109px) 100vw, 109px\" \/><\/a>The U.S. <strong>Department of Homeland Security (DHS)<\/strong> has issued a warning to retailers. DHS reports that cybercriminals are using <strong>remote desktop software<\/strong> to open up retailers&#8217; networks to <strong>point-of-sale malware<\/strong> attacks. <a title=\"Point of Sale\" href=\"http:\/\/whatis.techtarget.com\/definition\/point-of-sale-terminal-POS-terminal\" target=\"_blank\" rel=\"noopener noreferrer\">Point of Sale<\/a> (POS) systems have been at the heart of many of the recent data breaches. Retailers impacted include <a title=\"Target\" href=\"https:\/\/web.archive.org\/web\/20191016012257\/https:\/\/blogs.wsj.com\/corporate-intelligence\/2013\/12\/27\/targets-data-breach-timeline\/\" target=\"_blank\" rel=\"noopener noreferrer\">Target<\/a>, <a title=\"Jimmy John's\" href=\"https:\/\/krebsonsecurity.com\/2014\/07\/sandwich-chain-jimmy-johns-investigating-breach-claims\/\" target=\"_blank\" rel=\"noopener noreferrer\">Jimmy John&#8217;s<\/a>.\u00a0<span style=\"color: #333333; font-family: Arial, Helvetica, sans-serif; line-height: 19.600000381469727px;\"><a title=\"P.F. Chang&#039;s\" href=\"https:\/\/web.archive.org\/web\/20171204113950\/https:\/\/www.pfchangs.com\/security\/\" target=\"_blank\" rel=\"noopener noreferrer\">P.F. Chang&#8217;s<\/a>, <a title=\"Neiman Marcus\" href=\"https:\/\/web.archive.org\/web\/20211001220122\/https:\/\/www.nytimes.com\/2014\/01\/24\/business\/neiman-marcus-breach-affected-1-1-million-cards.html\" target=\"_blank\" rel=\"noopener noreferrer\">Neiman Marcus<\/a>, <a title=\"Michaels\" href=\"https:\/\/web.archive.org\/web\/20221127203459\/https:\/\/www.michaels.com\/notices\/ca-notices.html\" target=\"_blank\" rel=\"noopener noreferrer\">Michaels<\/a>, <a title=\" Sally Beauty Supply\" href=\"http:\/\/krebsonsecurity.com\/2014\/03\/zip-codes-show-extent-of-sally-beauty-breach\/\" target=\"_blank\" rel=\"noopener noreferrer\">Sally Beauty Supply<\/a>, and <a title=\"Goodwill Industries International\" href=\"http:\/\/krebsonsecurity.com\/2014\/07\/banks-card-breach-at-goodwill-industries\/\" target=\"_blank\" rel=\"noopener noreferrer\">Goodwill Industries International<\/a> t<\/span><span style=\"color: #333333; font-family: Arial, Helvetica, sans-serif; line-height: 19.600000381469727px;\">he<em> <a title=\"New York Times\" href=\"http:\/\/www.nytimes.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">New York Times<\/a> <\/em><\/span>reported.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20201029221808\/https:\/\/www.choosewhat.com\/starticles\/6-easy-ways-to-protect-your-credit-card-processing-system-from-hackers\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98607 \" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hackers1-1-e1564260780511-150x119.jpg?resize=113%2C90&#038;ssl=1\" alt=\"\" width=\"113\" height=\"90\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hackers1-1-e1564260780511.jpg?resize=150%2C119&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hackers1-1-e1564260780511.jpg?resize=75%2C60&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hackers1-1-e1564260780511.jpg?w=742&amp;ssl=1 742w\" sizes=\"auto, (max-width: 113px) 100vw, 113px\" \/><\/a>Research conducted by the <a title=\"U.S. Department of Homeland Security\" href=\"https:\/\/WWW.DHS.GOV\" target=\"_blank\" rel=\"noopener noreferrer\">DHS<\/a>, the <a title=\"Secret Service\" href=\"http:\/\/www.secretservice.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">Secret Service<\/a>, the <a title=\"National Cybersecurity and Communications Integration Center\" href=\"https:\/\/web.archive.org\/web\/20150905132538\/http:\/\/www.dhs.gov\/about-national-cybersecurity-communications-integration-center\" target=\"_blank\" rel=\"noopener noreferrer\">National Cybersecurity and Communications Integration Center<\/a>, and security firm <a title=\"Trustwave SpiderLab\" href=\"https:\/\/web.archive.org\/web\/20150215183448\/http:\/\/www.trustwave.com:80\/Services\/SpiderLabs-Services\/\" target=\"_blank\" rel=\"noopener noreferrer\">Trustwave SpiderLab<\/a>. have following the attacks. During the attacks, <strong>Cybercriminals are scanning<\/strong> corporate systems for <strong>remote desktop software. <\/strong>The attackers are looking for\u00a0<span style=\"color: #333333; font-family: Arial, Helvetica, sans-serif; line-height: 19.600000381469727px;\"><a title=\"Microsoft\" href=\"http:\/\/www.microsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a> (<a title=\"NASDAQ | MSFT\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-MSFT\/\" target=\"_blank\" rel=\"noopener noreferrer\">MSFT<\/a>) <a title=\"RDP\" href=\"http:\/\/windows.microsoft.com\/en-us\/windows7\/products\/features\/remote-desktop-connection\" target=\"_blank\" rel=\"noopener noreferrer\">Remote Desktop<\/a>,\u00a0<a title=\"Apple Computers\" href=\"http:\/\/www.apple.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Apple<\/a> (<a title=\"NASDAQ : AAPL\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-AAPL\/\" target=\"_blank\" rel=\"noopener noreferrer\">AAPL<\/a>) <a title=\"Apple Remote Desktop\" href=\"https:\/\/www.apple.com\/remotedesktop\/\" target=\"_blank\" rel=\"noopener noreferrer\">Remote Desktop<\/a>, <a title=\"Google\" href=\"https:\/\/www.google.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google<\/a> (<a title=\"NASDAQ : GOOG\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-GOOG\/\" target=\"_blank\" rel=\"noopener noreferrer\">GOOG<\/a>) <a title=\"Chrome Remote Desktop\" href=\"http:\/\/www.pcworld.com\/article\/2154184\/access-your-pcs-remotely-for-free-with-chrome-remote-desktop.html\" target=\"_blank\" rel=\"noopener noreferrer\">Chrome Remote Desktop<\/a>, <a title=\"Splashtop\" href=\"http:\/\/www.splashtop.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Splashtop<\/a>, <a title=\"Pulseway\" href=\"https:\/\/www.pulseway.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Pulseway<\/a>, and <a title=\"LogMeIn join.me\" href=\"https:\/\/www.goto.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">LogMeIn&#8217;s join.me<\/a>.<\/span><\/p>\n<h3>Install malware<\/h3>\n<p><span style=\"color: #333333; font-family: Arial, Helvetica, sans-serif;\">After finding an exposed system, attackers<\/span> launch <strong>brute force attacks on the login<\/strong> feature. <a href=\"https:\/\/web.archive.org\/web\/20160729153456\/http:\/\/www.fierceitsecurity.com:80\/?\" target=\"_blank\" rel=\"noopener noreferrer\"><em>FireceIT Security<\/em><\/a> <a href=\"https:\/\/web.archive.org\/web\/20150919010019\/http:\/\/www.fierceitsecurity.com\/story\/remote-desktop-software-opens-retailers-doors-pos-malware\/2014-07-31\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> that once the attackers gain network access, they deploy <strong>Backoff POS malware.\u00a0 steal customer payment data and hide the theft using encryption. <\/strong>\u00a0An <a href=\"https:\/\/web.archive.org\/web\/20181116144918\/https:\/\/www.us-cert.gov\/security-publications\/Backoff-Point-Sale-Malware\" target=\"_blank\" rel=\"noopener noreferrer\">alert<\/a> was issued by <strong><a href=\"http:\/\/www.us-cert.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">US-CERT<\/a><\/strong> on 07-31-2014 that explained how the malware gets installed.<\/p>\n<p style=\"padding-left: 30px;\"><em>At the time of discovery and analysis, the [Backoff] malware variants had low to zero percent anti-virus detection rates, which means that fully updated anti-virus engines on fully patched computers could not identify the malware as malicious<\/em><\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20150926084842\/http:\/\/blogs.norman.com\/2012\/for-consumption\/new-malware-type-old-security-threat\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98609 \" title=\"malware\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-4.jpg?resize=90%2C90&#038;ssl=1\" alt=\"malware\" width=\"90\" height=\"90\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-4.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-4.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-4.jpg?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 90px) 100vw, 90px\" \/><\/a>US-CERT has informed <strong>anti-virus vendors<\/strong> of the threat from <a href=\"https:\/\/web.archive.org\/web\/20140804030626\/http:\/\/blog.spiderlabs.com:80\/2014\/07\/backoff-technical-analysis.html\" target=\"_blank\" rel=\"noopener noreferrer\">Backoff malware<\/a> and they will be <strong>updating their software<\/strong> to detect and block the malware. The malware can <strong>scrape memory for track data, log keystrokes, engage in command and control communication, and inject a malicious stub<\/strong> into explorer.exe that ensures &#8220;persistence in the event the malicious executable crashes or is forcefully stopped.&#8221;<\/p>\n<p>The article concludes, &#8220;The impact of a <strong>compromised POS system<\/strong> can affect both the businesses and consumer by exposing customer data such as names, mailing addresses, <strong>credit\/debit card numbers<\/strong>, phone numbers, and e-mail addresses to criminal elements. These breaches can impact a business&#8217; brand and reputation, while consumers&#8217; information can be used to make fraudulent purchases or risk compromise of bank accounts.<\/p>\n<p><strong><em> rb-<\/em><\/strong><\/p>\n<p><em><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98611 \" title=\"Lesson learned?\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/why_boys_need_parents.jpg?resize=115%2C108&#038;ssl=1\" alt=\"Lesson learned?\" width=\"115\" height=\"108\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/why_boys_need_parents.jpg?resize=150%2C141&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/why_boys_need_parents.jpg?resize=75%2C71&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/why_boys_need_parents.jpg?w=450&amp;ssl=1 450w\" sizes=\"auto, (max-width: 115px) 100vw, 115px\" \/>If mega-firms like Target can be breached, what chance do small mom-and-pop POS firms in schools, food trucks, kiosks at the airport stand? I say not much. I have worked with several POS vendors and it seems they barely understand their own product, let alone SSL certs, VPNs. <\/em><\/p>\n<p><em>Here are some tips from <a title=\"Data Breach Investigations Report (DBIR) \" href=\"http:\/\/www.verizonenterprise.com\/DBIR\/\" target=\"_blank\" rel=\"noopener noreferrer\">Verizon\u2019s 2012 research<\/a> into security breaches affecting companies that use POS systems to process customer payments. Make sure your POS vendor does the following: <\/em><\/p>\n<p style=\"padding-left: 30px;\"><em><strong>1.\u00a0 Change administrative passwords on all POS systems.<\/strong> (Hackers are scanning the Internet for easily guessable passwords).<\/em><\/p>\n<p style=\"padding-left: 30px;\"><em><strong>2.\u00a0 Implement a firewall or access control list on remote access \/administration services.<\/strong> (If hackers can\u2019t reach your systems, they can\u2019t easily steal from it).<\/em><\/p>\n<p style=\"padding-left: 30px;\"><em><strong>3.\u00a0 Avoid using POS systems to browse the web<\/strong> (or anything else on the Internet).<\/em><\/p>\n<p style=\"padding-left: 30px;\"><em><strong>4.\u00a0 Make sure your POS is a <a title=\"What is PCI DDS?\" href=\"https:\/\/web.archive.org\/web\/20200501132614\/https:\/\/searchfinancialsecurity.techtarget.com\/definition\/PCI-DSS-Payment-Card-Industry-Data-Security-Standard\" target=\"_blank\" rel=\"noopener noreferrer\">PCI DSS compliant<\/a> application<\/strong> (ask your vendor) <\/em><\/p>\n<p style=\"padding-left: 30px;\"><em><strong>5.\u00a0 Use password management software like <a title=\"LastPass Password Management\" href=\"https:\/\/lastpass.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">LastPass<\/a> to generate secure passwords. <\/strong>(<\/em><em>LastPass<\/em> allows you to avoid storing passwords in your browsers and can generate ready-to-use secure passwords for you).<\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/time.com\/3070555\/malware-backoff-dhs-hacking-retail\/\" target=\"_blank\" rel=\"noopener noreferrer\">600 Retailers Ensnared in Major New Malware Hack, Cybersecurity Firm Says<\/a> (time.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>DHS issued an alert that remote desktop software is opening retailers to stealth POS malware attacks to steal credit cards and PII<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2292,420,101,536,92,23,82,421,2205,2206,2207,4],"class_list":["post-71320","post","type-post","status-publish","format-standard","hentry","category-security","tag-2292","tag-aapl","tag-apple","tag-goog","tag-google","tag-malware","tag-microsoft","tag-msft","tag-point-of-sale","tag-pos","tag-remote-desktop","tag-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/71320","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=71320"}],"version-history":[{"count":25,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/71320\/revisions"}],"predecessor-version":[{"id":132164,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/71320\/revisions\/132164"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=71320"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=71320"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=71320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}