Unsecured Elasticsearch servers turned into PoS malware C&Cs

Security researchers have discovered over 4,000 Elasticsearch servers compromised to distribute and control PoS malware. 99 percent of them are hosted by Amazon. What is Elasticsearch? Elasticsearch is the most popular choice for enterprise search engines. Based on the open source information retrieval software library Lucene, it is itself open source, and it provides a full-text search engine with an HTTP web interface and JSON documents. A number of organizations, including Amazon Web Services (AWS), … More Continue reading Unsecured Elasticsearch servers turned into PoS malware C&Cs

PoS malware hits food kiosks, steals payment card and biometric info

PoS malware can lurk in the most unexpected of places, and some have recently been found in the payment kiosks by US-based vendor Avanti, stealing payment card and biometric information. Those “micro markets” are effectively unmanned retail spaces where users can choose snacks and beverages and pay through a kiosk. They can be found at offices throughout the US, are usually installed, maintained and restocked by local resellers, and accept payment via payment card, cash, … More Continue reading PoS malware hits food kiosks, steals payment card and biometric info

RawPOS malware has new data-grabbing capabilities

RawPOS continues to evolve, and has recently been equipped with the capability to steal data contained in the victims’ driver’s license’s 2-dimensional barcode. “Although the use of this barcode is less common than credit card swipes, it is not unheard of. Some people might experience getting their driver’s license barcode scanned in places like pharmacies, retail shops, bars, casinos and others establishments that require it,” Trend Micro researchers explained. “Traditionally, PoS threats look for credit … More Continue reading RawPOS malware has new data-grabbing capabilities

12 tips for implementing secure business practices

Optiv Security shared a list of a dozen tips for implementing secure business practices during the 2016 holiday season. Security experts developed these recommendations to help security and IT teams better prepare their companies and employees to address the increase in cyber threats that occur during this time of year. 1. Limit temporary worker privileges Many organizations employ temporary workers during the holidays to address increased demand for their products or services, and backfill employees … More Continue reading 12 tips for implementing secure business practices

PoS attacks: Undetected vulnerabilities lay in wait

Attivo Networks issued a report detailing severe vulnerabilities in the nation’s POS systems that could lead to large breaches during the Holiday shopping period and on into next year. The report, based on primary research, shows how attackers are moving laterally undetected through networks, compromising asset management servers and then using them to plant malware on POS terminals for either timed or remote activation, creating the foundation for wide-scale credit card information theft. The lack … More Continue reading PoS attacks: Undetected vulnerabilities lay in wait

The New Mindset Required for Making a Dent in the World of Cybercrime

We all know that cybercrime is increasing and likely to jump from a $75 billion problem last year to a $170 billion problem in 2020. Most will argue that this out of control spiral that the cybersecurity industry is in is unavoidable. It’s just the nature of the game. We will always be one step […]… Read More

The post The New Mindset Required for Making a Dent in the World of Cybercrime appeared first on The State of Security.

Continue reading The New Mindset Required for Making a Dent in the World of Cybercrime

US hotels hit by payment card slurping malware

10 months after merchants were to assume financial responsibility if they didn’t install chip readers, we’re still seeing POS breaches. Continue reading US hotels hit by payment card slurping malware