Top Banner
POS Malware: Is your Credit/Debit Card Transaction Secure? Amit Malik Member @ Cysinfo Researcher @ Netskope
15

POS Malware: Is your Debit/Credit Transcations Secure?

Jan 22, 2017

Download

Technology

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: POS Malware: Is your Debit/Credit Transcations Secure?

POS Malware: Is your Credit/Debit Card

Transaction Secure?Amit Malik

Member @ Cysinfo Researcher @ Netskope

Page 2: POS Malware: Is your Debit/Credit Transcations Secure?

Agenda• POS Terminal

• Understanding Credit Card transaction ecosystem

• POS malware - Introduction

• POS Malware Evolution

• POS Infection Vectors

• Case study

• BlackPOS

• New Technologies (EMV/NFC/RFAID)

Page 3: POS Malware: Is your Debit/Credit Transcations Secure?

POS Terminal• Wikipedia: ht tps:/ /en.wikipedia.org/wiki /

Point_of_sale

• POS terminals are combination of software and hardware that allows the retail locations to accept credit card.

Page 4: POS Malware: Is your Debit/Credit Transcations Secure?

Credit Card Transaction Ecosystem

http://www.pathwaypayments.com/processing-diagram.html

Page 5: POS Malware: Is your Debit/Credit Transcations Secure?

Inside Credit Card• Magnetic Strip of the card has three data tracks

-1,2 and 3. Only Track -1, 2 are used by cards.

• Track 1 was created by IATA (International Airport Transpor t Associat ion) and contains 79 alphanumeric characters.

• Track 2 was created by American Bankers Association and contains 40 numeric characters.

• https://en.wikipedia.org/wiki/Magnetic_stripe_card

Page 6: POS Malware: Is your Debit/Credit Transcations Secure?

Inside Credit Card Cont.

• Checksum is calculated using Luhn algorithm (https://en.wikipedia.org/wiki/Luhn_algorithm).

• https://en.wikipedia.org/wiki/Payment_card_number

Page 7: POS Malware: Is your Debit/Credit Transcations Secure?

POS Malware: Introduction• Early data breaches used network sniffing to

capture the card data while in transit. But this became obsolete because of end to end encryption on the wire.

• POS terminals read the card data. The card data can be found in clear text for a very small amount of time in the POS RAM.

• POS malware scrap the RAM to collect the card data.

Page 8: POS Malware: Is your Debit/Credit Transcations Secure?

POS Malware Data Breaches

20122013

20142015

2016

subwayTarget

& The Home Depot

SchnucksNEXTEP

& Hilton

MICROS

Page 9: POS Malware: Is your Debit/Credit Transcations Secure?

POS Malware Data Breaches In Numbers

0

150

300

450

600

2013 2014 2015

*Data from Verizon Reports

Page 10: POS Malware: Is your Debit/Credit Transcations Secure?

POS Malware Incidents per Industry

0

25

50

75

100

Accomodation

Entertainment

Healthcare

Retail

Other Services

2013 2014 2015

*Data from Verizon Reports

%

Page 11: POS Malware: Is your Debit/Credit Transcations Secure?

POS malware Evolution

20112012

20132014

2015

Rdasrv VmSkimmer, Chewbacca

BlackPOS, Alina, Dexter

Decebal, JackPOS, Soraya, Backoff, BrutPOS,

BlackPOS v2

POSeidon, LogPOS, pwnPOS,

FighterPOS

Page 12: POS Malware: Is your Debit/Credit Transcations Secure?

POS Infection Methods• Stolen Credentials

• Social engineering

• Phishing Campaign

• Insiders

• Software vulnerability

Page 13: POS Malware: Is your Debit/Credit Transcations Secure?

Case Study - BlackPOS• Demo (Conceptual) - Memory scrapping using

Pymal

• Sample Analysis - BlackPOS.

Page 14: POS Malware: Is your Debit/Credit Transcations Secure?

New Technologies• EMV - ‘Chip and PIN’, The chip on the card now

stores the encrypted card data. It makes the counterfeit difficult but not immune to POS malware.

• New methods like Apple pay or contactless payment methods are not vulnerable to this threat but they open the new possibilities and change in threat landscape.

Page 15: POS Malware: Is your Debit/Credit Transcations Secure?

Thank You!