Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Malware Targets Retailers Using Cloud-based PoS Services

18/06/2014 by

W1siziisijiwmtqvmtavmjgvmtuvmzcvmtqvntuxl2zpbguixsxbinailcj0ahvtyiisijywmhg0mdbcdtawm2uixv0


Retail’s data breach woes continue with an SMB-focused baddie.

Large point-of-sale-related breaches continue to dominate security press headlines, but new dangers threaten to exacerbate the situation by compromising the small to medium-sized bracket. A fresh cloud-based point-of-sale (PoS) malware – dubbed POSCloud – has been spotted carrying out targeted attacks on software deployed by grocery stores, retailers and other small businesses using web browsers like Internet Explorer, Safari, or Google Chrome.

The new malware family was identified by IntelCrawler, a Los Angeles-based cyber-threat intelligence firm, which noted in an analysis that front-office systems support integration options with credit card readers, barcode scanners, cash drawers and receipt printers. Meanwhile, back-office systems utilize cloud-based PoS services. It means that merchants are able to store data and reporting in public infrastructure, which is accessible remotely via PCs, as well as through mobile devices.

“Compromised cloud-based PoS service providers allow alterations to gift card information, even the ability to create gift cards for themselves and discount vouchers for any customer,” the firm explained. “In addition, bad actors have the ability to gain access to employee management subsystems, which could be also used for internal fraud.”

Several cloud-based PoS systems allow the storage of credit card details for further use by customers, as well as personal identifiable information (PII) for customer loyalty campaigns. Even if the data is encrypted, the bad actors can successfully collect this data when the operator is working with the software via installed key-logging malware. The extracted PII is then sold to underground identity thieves and also used for cyber-espionage against large number of customers from different countries.

This article has been extracted from http://www.infosecurity-magazine.com, please click on this link to read the article in full http://www.infosecurity-magazine.com/view/38862/malware-targets-retailers-using-cloudbased-pos-services/

Montash is a multi-award winning, global IT recruitment firm. Specialising in permanent and contract positions across mid-senior appointments which cover a wide range of industry sectors and IT functions, including:

ERP, BI & Data, Information Security, IT Architecture & Strategy, Scientific Technologies, Demand IT and Business Engagement, Digital and E-commerce, Infrastructure and Service Delivery, Project and Programme Delivery.

With offices based in London, Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid-management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdkvmtgvmtavmtivndyvodeyl1dvbwvuigluihrly2ggkdiplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Tech is for girls... and always has been!

2017-09-18 10:00:00 +0100

Today, it's hard to deny that the IT and tech industry is a male-dominated field. Women earn only 28%[1] of computer science degrees, while the quit rate for women in the high tech industry is 41%[2], twice as high as it is for men. These two statistics would suggest that perhaps women aren't just discouraged from entering the tech field, but may find it a challenging environment to work in both in terms of treatment and pay. Facebook chief operating of...

W1siziisijiwmtcvmdkvmdgvmtevmtuvmzqvmtgwl0hpcmluzybnaxn0ywtlcy5qcgcixsxbinailcj0ahvtyiisijm4mhgxmdajil1d

Common Hiring Mistakes for SAP Consultants

2017-09-08 12:00:00 +0100

Choosing the wrong consultant can lead a project down a ruinous path. Deadlines get missed, quality of work decreases and money is wasted. When you're putting together a new SAP project, getting the right talent is paramount. We discussed hiring mistakes with our Senior Business Manager, Adam Blaney and asked him the question of how to minimise risk in hiring SAP Consultants. “Hiring any form of technology based consultant is difficult. The hardest part...