In July this year, the US Department of Homeland Security issued a BackOff POS malware threats on to steal cardholder data and customers’ personal information. Their Computer Emergency Response Team (US-CERT) released this week, which Backoff malicious software being utilized to the crisis a number of large enterprise networks and small and medium enterprises. They encourage managers and operators of-sale systems review Backoff malware alerts July 31 to determine whether their network is affected. He also encouraged those organizations that are already infected malware Backoff contact their local office of the US Secret Service.
Since the Department of Homeland Security issued this Backoff news, there have been uncovered by the massive destruction of POS events. It was reported that the US Secret Service, at least 1,000 retailers damaged Backoff, and seven manufacturers POS system is also reported that their system has been infected. UPS store and two of the largest supermarket chain SuperValu and AB Acquisition of the few high-profile companies Backoff believed to have been destroyed.
Why POS so vulnerable?
Most POS systems running Windows operating systems including desktop computers and a few POS devices directly connected. Windows is recognized and hackers target by the attention. In many cases, POS PC is treated as desktop computers on other carrier networks, the use of anti-virus software and a personal firewall protection as a standard terminal.
Most endpoint security vulnerable to zero-day malware attacks, the threat has not been suppliers have found, and they have not been updated signature files. Malware authors are very good at modifying those known malware files, so that they are not likely to threaten to be found. Target’s attack malware, BlackPOS, at least three months before being discovered, has appeared. Most anti-virus system has been updated to handle it. According to Verizon 2014 years of data disclosure report, 85 percent of POS machines invasion, before being found to have destroyed the target over two weeks.
When you find malware attacked your system is probably already too late.
That is why the desktop and endpoint security management of Comodo Internet Security suite is designed to solve the zero-day threats, and no other product can. Its unique “default deny” architecture ensures that no malicious software to run on the operating system, and does not allow them access to the file system. If a program has not been determined to be safe, then you can only run in a sandbox, a safe and reliable isolation systems area.
Komodo has expanded its “container” and SecureBox concept. This is a client software available to protect them and to maximize terminal and server communication. SecureBox strongly recommended to POS systems.