Top Banner
POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT INFORMATION Eric M. Fiterman [email protected] www.linkedin.com/pub/eric-fiterman/ 43/483/509/
55

POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // [email protected] “We don’t know the

May 28, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR

PROTECTING CUSTOMER PAYMENT INFORMATION

Eric M. Fiterman [email protected]

www.linkedin.com/pub/eric-fiterman/43/483/509/

Page 2: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

Myth: It’s hard to build targeted malware

Page 3: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

Page 4: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

Page 5: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

“We don’t know the full extent of what transpired, but what we do know is that there was malware installed on our point-of-sale registers. That much we’ve established.”

- Gregg Steinhafel, Target CEO

Page 6: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

Only a handful of people likely know all of the particulars, but the event has sent ripples

throughout industry

Page 7: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

1959 2014

Page 8: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

Who hasn’t shopped at Target?

Page 9: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

…the second-largest retailer in the U.S.

Page 10: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

This event made security extremely personal

Page 11: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

Although we are discussing high volume retail, the same rules apply for protecting other types

of critical information

Page 12: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

Page 13: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

I’ve received personal notice of at least 3 data breaches in the last 3 months:

• Target

• Adobe

• University of Maryland (pending)

Page 14: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

Point-of-Sale (Point-of-Capture)

Page 15: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

Photo by tvol / CC BY

Page 16: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

Photo by fourstarcashiernathan / CC BY

Page 17: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

Photo by ray.k / CC BY

Page 18: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

• A magnetic stripe reader is not a prerequisite for a POS

!

• If you enter credit card information into a computer, it’s a POS

Page 19: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

Photo by mattbuchanan / CC BY

Page 20: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

Volume retail is a high frequency transaction environment

Page 21: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

0

17.5

35

52.5

70

0

25

50

75

100

Page 22: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

How did they get in?

Page 23: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

“Like Target, we are a victim of a sophisticated cyber attack operation. We are fully cooperating with the Secret Service and Target to identify the possible cause of the breach and to help create proactive initiatives that will further enhance the security of client/vendor connections making them less vulnerable to future breaches.”

- Ross E. Fazio, President, Fazio Mechanical Services, Inc.

Page 24: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

Page 25: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

Compliance: 1

Security: 0

Page 26: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

SDN VMware

Citrix

Cloud

vSwitchHyper-V

Page 27: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

Page 28: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

Olive Cardin’

http://www.youtube.com/watch?v=dh3JaTEqHB0

Page 29: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

Page 30: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

‣ A credit card reader is an input device

!

‣ It’s designed to expedite payments and reduce errors

!

‣ If it’s not encrypted at the point of capture - it’s vulnerable to theft

Page 31: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

Target malware

Extract CC Dump via CIFS

Page 32: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

Page 33: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

or build your own…

Page 34: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

Page 35: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

Page 36: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

Let’s see how it runs…

Page 37: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

Page 38: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

Page 39: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

TotalRecall gets a clean bill of health from VirusTotal

Page 40: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

Anti-virus is a dead technology

Page 41: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

‣ Hash injection (pass-the-hash) impersonation attacks are close cousins to data-stealing RAM scrapers

!

‣ If it’s sensitive and in memory - it’s vulnerable (although Address Space Layout Randomization helps a bit)

Page 42: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

Page 43: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

So what can you do?

Page 44: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

Reduce your exposure

Page 45: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

Sensitive data is both an asset and a liability

!

Get rid of it unless you absolutely, positively need it to run your business (e.g. Paypal, Stripe,

etc)

Page 46: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

Know where you sensitive data really lives, where it goes, what it touches

Page 47: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

Courtesy UK BERR

Page 48: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

Encrypt at the point of capture (P2PE)

Page 49: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

‣ Compliance has us lost in spreadsheets chasing hundreds of security controls

!

‣ Set some basic, simple standards that you understand and can realistically address

Page 50: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

Detection & Response

Page 51: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

Understand how your domain infrastructure will work against you

Page 52: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

http://krebsonsecurity.com/tag/dell-secureworks/

Page 53: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

Although not very advanced, RAM scrapers need to be persistent:

✓ startup

✓ bootup

✓ services*

Page 54: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

Look for the C2

Page 55: POINT-OF-SALE (POS) MALWARE: TACTICS AND STRATEGIES FOR PROTECTING CUSTOMER PAYMENT ... · 2015-05-28 · Eric M. Fiterman // POS Malware // eric@spotkick.com “We don’t know the

Eric M. Fiterman // POS Malware // [email protected]

Resources• Kernelmode.info

• krebsonsecurity.com

• Dell SecureWorks*

• github.com/datacast/totalrecall