POS Malware rise. How can you secure your POS from frequent Malware attacks

No comments

POS Malware Rise and affecting systems can be done. But the only thing to avoid this type of breach is to secure the overall system with high-end server security. Without a high-end security server, you can never say when your system can be affected.

How many restaurants are facing from POS Malware rise?

Earl Enterprises, the parent company of a couple of restaurants. Such as Buca di Beppo, Earl of Sandwich, and Planet Hollywood, disclosed last week a ton of its eateries are affected with an almost yearlong payment card violation, leading to a few 2 thousand stolen credit card numbers.

The hospitality company revealed the violation on Friday, roughly a month following cybersecurity reporter Brian Krebs pinged Buca di Beppo and advised the firm he detected some of its clients’ debit and credit card numbers being marketed on a subterranean carding forum.

Earl Enterprises, which also counts restaurants such as Chicken Guy! , Mixology, and Tequila Taqueria, one of its clientele, stated following attackers set presumably the purpose of malware, on its own systems, that all its restaurants were affected in some manner, shape or form from the violation.

Trades that are influenced and the dates vary by place and restaurant but most were struck between March 18, 2019, and May 23, 2018. It is uncertain what the attackers left off but according to the business, the application was made to catch payment card information, such as expiration dates, card numbers, and possibly, cardholder names.

The company, which is based in Orlando, Fla., could not reveal how many diners had swiped their credit card and at the present situation scenario, around 2 million credit cards are being sold in the underground market. It pisses off even at this high technology we are facing this issue. Which shouldn’t be done at any cost.

How come attackers execute this task?

In order to place POS malware on a system, attackers either have to physically alter a POS device or exploit a vulnerability over the target’s network in order to infect it. From there, the malware usually scrapes Track 1 and Track 2 data before it’s encrypted and sent off to a payment processor.

POS Malware rise

POS malware rise has remained a powerful tool for attackers looking to exfiltrate card data – commonly from the food and hospitality industry – for years, with new variants continuing to surface and spread in the wild. Researchers, both with Flashpoint and Cisco Talos, uncovered two types of POS malware rise last month.

POS malware has turned into a highly effective tool for attackers seeking to exfiltrate card information – from the hospitality and meals sector — for decades and disperse from the wild. Malware month, both with Cisco and Flashpoint Talos, researchers, discovered two kinds of POS.

Researchers using the prior stated three months past the founders of one breed, DMSniff, happen to be using a domain name generation algorithm (DGA) to alter up its own command and control domain names to prevent detection.

The process which goes is highly sophisticated for POS malware. It will make the data to be shared among the attackers even if you close the whole system. The source news said that it has been attacked the restaurants and theaters adversely.

Around the same time Flashpoint published their findings, researchers with Cisco’s Talos Group said that they had uncovered a new strain of POS malware as well.

How to overcome this malware and protect POS systems?

1. Try to use POS Software and integrate into the computer.

It’s like you’re buying the total POS system and operating it which has limited features and it will be in more price compared to POS Software. So the solution is you need to purchase POS Software which will be a better safety option. Because the server will be secured and all the necessary equipment will be installed.

Here at WOVVIPOS, we use a completely protected POS Software for Restaurant and all other various business. You can complete your transaction even without internet and moreover, you can view your sales directly from your phone or iPad.

2. Using Chip Readers

The main problem arises by swiping the cards and the data is stolen. Instead, if the technology relies on EMV technology. There will be no swiping and produce a unique code every time a transaction is carried out. So it is not easy to breach transaction details and data.


wovvtechPOS Malware rise. How can you secure your POS from frequent Malware attacks
read more