{"id":15145,"date":"2016-06-09T22:28:59","date_gmt":"2016-06-09T22:28:59","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=5641"},"modified":"2020-02-26T11:09:39","modified_gmt":"2020-02-26T16:09:39","slug":"atm-pos-protect","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/atm-pos-protect\/15145\/","title":{"rendered":"Why ATMs and points of sale need protection and what we have done to provide it"},"content":{"rendered":"<p>Just recently, <a href=\"https:\/\/business.kaspersky.com\/embedded-security\/5616\/\" target=\"_blank\" rel=\"noopener nofollow\">we discussed<\/a> the problem of integrated (or embedded) software losing vendor support. The problem primarily affects companies whose business involves the use of ATMs and point-of-sale terminals.<\/p>\n<p>An overwhelming number of these devices still run Windows XP \u2014 an operating system that is never going to be updated again. Therefore, any of its vulnerabilities that were not patched \u2014 or even discovered yet \u2014 are here to stay. That situation is creating security issues for the companies that operate these devices and rely solely on the integrated Windows XP Embedded security mechanisms.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Why #ATMs and points of sale need protection and what we have done to provide it. #security<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fj6AK&amp;text=Why+%23ATMs+and+points+of+sale+need+protection+and+what+we+have+done+to+provide+it.+%23security\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p><strong>Closer to the money<\/strong><\/p>\n<p>A few years ago, Kaspersky Lab\u2019s security experts predicted that cybercriminals would start attacking ATMs and point-of-service (POS) terminals directly. That prediction was fully justified: First, our experts identified the <a href=\"https:\/\/www.kaspersky.com\/blog\/tyupkin-atm-malware\/6246\/?utm_medium=blg&amp;utm_source=kb_post_160610&amp;utm_campaign=ww_promo\" target=\"_blank\" rel=\"noopener nofollow\">Tyupkin<\/a> attack \u2014 and the malware used in it is still active. Moreover, we recently discovered another criminal group, ATM-Infector, which uses a new version of this Trojan. In addition, over the past two years reports have emerged of numerous POS infections in major retail chains, resulting in major data leaks. The biggest leaks were in <a href=\"https:\/\/threatpost.com\/reports-target-suffered-massive-data-breach-starting-on-black-friday\/103232\/?utm_medium=blg&amp;utm_source=kb_post_160610&amp;utm_campaign=ww_promo\" target=\"_blank\" rel=\"noopener nofollow\">Target<\/a>, <a href=\"https:\/\/threatpost.com\/wendys-comes-clean-on-data-breach\/118034\/?utm_medium=blg&amp;utm_source=kb_post_160610&amp;utm_campaign=ww_promo\" target=\"_blank\" rel=\"noopener nofollow\">Wendy\u2019s<\/a><u>,<\/u> and the <a href=\"https:\/\/threatpost.com\/hotel-chain-hilton-worldwide-investigating-potential-pos-breach\/114830\/?utm_medium=blg&amp;utm_source=kb_post_160610&amp;utm_campaign=ww_promo\" target=\"_blank\" rel=\"noopener nofollow\">Hilton<\/a> hotel network.<\/p>\n<p>These hacks happen because ATMs and points of sale are very easy targets for attackers. The targets often have both lame cyberdefense and insufficient physical security.<\/p>\n<p>ATMs are essentially <a href=\"https:\/\/www.kaspersky.com\/blog\/invisible-skimmer-at-atm\/12121\/?utm_medium=blg&amp;utm_source=kb_post_160610&amp;utm_campaign=ww_promo\" target=\"_blank\" rel=\"noopener nofollow\">conventional, x86-compatible computers<\/a>, supplemented with specialized equipment and software. The same is true for point-of-sale terminals. These devices run special, very limited versions of operating systems with tools the service device doesn\u2019t need disabled. But looking past the limitations, there is fundamentally no difference between an ordinary Windows installation and a limited one.<\/p>\n<p>These devices are typically located away from their service departments, but they run within the internal networks of companies and often have a direct connection to the Internet. Almost all of them process personal data or maintain financial transactions.<\/p>\n<p><strong>The urgent problem<\/strong><\/p>\n<p>For security, the PCI DSS standard regulates a large number of technical requirements and parameters for systems that process payment by cards. However, those rules now focus primarily on addressing the risks of traditional viral infections. In fact, the regulations neglect features specific to devices such as ATMs and POS systems \u2014 and ignore the peculiarities of attacks against them. Because of the obsolete hardware and out-of-date operating systems, not to mention the absence of reliable data channels (of an average capacity at least), using conventional antivirus software is inefficient \u2014 and often impossible.<\/p>\n<p>Today, hackers possess a wide range of tools for hacking ATMs \u2014 some to use with direct access to a particular device and also some for remote hacking.<\/p>\n<p>Remote attackers have several options. Most often, our investigators discover incidents of unauthorized access over a trusted network (for example, an ATM is infected by means of physical access and the malware further spreads within the intranet), but sometimes the experts reveal the consequences of a successful targeted attack against a bank or the use of VPN vulnerabilities.<\/p>\n<p>The goal is always the same: an opportunity to steal money or collect the data of credit and debit cards while remaining undetected. Sometimes the criminals manage to hide for a very long time.<\/p>\n<p>Payment terminals are another common vector of personal data leaks. According to this <a href=\"https:\/\/msisac.cisecurity.org\/whitepaper\/documents\/1.pdf\" target=\"_blank\" rel=\"noopener nofollow\">2015 Verizon report<\/a>, up to one-third of these incidents take place as a result of hacked point-of-sale devices. Why? Well, the terminals\u2019 applications don\u2019t take information security requirements into account at all, and therefore, they may contain flaws through which they can be easily infected. And they are usually connected to the Internet (to access various databases), which only facilitates the work of hackers.<\/p>\n<p>Payment terminals at Target got infected because they were in the same network as the company\u2019s project management systems \u2014 which cybercriminals had accessed through one of the contractors involved in servicing Target\u2019s air conditioning systems.<\/p>\n<p>The Target incident is by no means an exception. Many corporate infections occur by the fault of service units or service companies with legitimate access to devices (whether remotely or locally, for example through a USB port). And negligence alone is not always to blame. In some cases, employees of the organizations have used their positions to deliberately infect terminals. That kind of violation is virtually impossible to notice because service remains operational for customers.<\/p>\n<p><strong>Countermeasures<\/strong><\/p>\n<p>What means does Kaspersky Lab offer to solve these problems? Obviously, this case requires an additional layer of protection, and so we developed a solution, called <a href=\"https:\/\/www.kaspersky.ru\/enterprise-security\/embedded-systems?redef=1&amp;THRU&amp;reseller=gl_kbusinesspost_pro_ona_smm__onl_b2b_kbusiness_lnk_______\" target=\"_blank\" rel=\"noopener\">Kaspersky Embedded Systems Security<\/a><u>,<\/u> specifically to secure embedded hardware. KESS uses comprehensive security technologies, but it can operate effectively on machines with limited functionality and extremely low performance. ATMs and points of sale typically run obsolete hardware, and their software is seldom updated.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>ATMs and points of sale typically run obsolete hardware, and their software is seldom updated. #security<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fj6AK&amp;text=ATMs+and+points+of+sale+typically+run+obsolete+hardware%2C+and+their+software+is+seldom+updated.+%23security\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>In Kaspersky Embedded Systems Security, we implemented technologies to prevent popular methods of attack against these types of devices. The Default Deny mode permits the system to use only those files, drivers, and libraries that are explicitly authorized by the administrator. The process of adding applications, scripts, and drivers to the list of exceptions does not require radical intervention, and therefore the protection doesn\u2019t become an additional burden for service personnel. KESS secures ATMs and payment terminals from complex targeted threats at the level of endpoints.<\/p>\n<p>The solution also includes the Device Control function, which enables the blocking of unauthorized attempts at physically connecting USB drives, thus eliminating one of the primary flaws regularly exploited by cybercriminals.<\/p>\n<p>Kaspersky Embedded Systems Security is fully compatible with all current versions of Windows, as well as with Windows XP Embedded, Windows Embedded 8.0 Standard, and Windows 10 IoT. System requirements are minimal: 256MB of RAM and 50MB of disk space.<\/p>\n<p>To learn more about Kaspersky Embedded Systems Security follow this link: <u><a href=\"https:\/\/www.kaspersky.ru\/enterprise-security\/embedded-systems?redef=1&amp;THRU&amp;reseller=gl_kbusinesspost_pro_ona_smm__onl_b2b_kbusiness_lnk_______\" target=\"_blank\" rel=\"noopener\">http:\/\/www.kaspersky.com\/enterprise-security\/embedded-systems<\/a><\/u>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ATMs and point-of-service systems are extremely vulnerable to malware \u2014 and software vendors are no longer patching them. Here\u2019s how to make them safer.<\/p>\n","protected":false},"author":2051,"featured_media":15317,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[401,1431,2425,2265,2780,97,600],"class_list":{"0":"post-15145","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-atm","10":"tag-atms","11":"tag-pos","12":"tag-pos-attacks","13":"tag-retail","14":"tag-security-2","15":"tag-windows-xp"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/atm-pos-protect\/15145\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/atm-pos-protect\/3794\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/atm-pos-protect\/15145\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/atm-pos-protect\/15145\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/atms\/","name":"ATMs"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15145","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2051"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15145"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15145\/revisions"}],"predecessor-version":[{"id":33703,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15145\/revisions\/33703"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15317"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15145"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15145"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15145"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}