Menu
Retailers urged to defend against 'Backoff' point-of-sale malware

Retailers urged to defend against 'Backoff' point-of-sale malware

The PCI Security Standards Council says the Backoff malware is 'a very real threat'

A payment card industry security consortium warned retailers on Wednesday of the urgency to secure their systems against "Backoff," a malicious software program that steals card numbers.

Backoff "represents a very real threat to the security of cardholder data in all organizations," wrote the PCI Security Standards Council, an organization founded by MasterCard, Visa, American Express and other card companies.

The U.S. Secret Service and Department of Homeland Security warned last week that 1,000 U.S. businesses may be infected by Backoff, which wasn't detected by most antivirus security software until earlier this month.

The retail industry has been shaken by attackers who have successfully installed malware on point-of-sale devices that process card payments, including Target, Neiman Marcus, White Lodging, Michaels and UPS store.

Card breaches have been reported by Supervalu and P.F. Chang's China Bistro, while several other companies have ongoing investigations into suspected breaches.

Card companies require companies to be compliant with the extensive security requirements issued by PCI-DSS or face liability for fraudulent purchases. But despite passing PCI audits, many companies have been hacked nonetheless, with attackers still finding network weaknesses.

The PCI Council recommended that companies check with their antivirus vendor to make sure their product detects Backoff and run a scan immediately. The organization also advised to "review all system logs for any strange or unexplained activity, especially large data files being sent to unknown locations."

Retailers should also refresh their passwords and change default ones, a long recommended security practice but one which still catches companies off guard.

Other recommendations made by the PCI Council may not be so easy or cheap. It recommended that merchants use card processing devices that encrypt data immediately after it is captured.

Several types of malware found on point-of-sale devices are so-called memory "scrapers," which capture the card data while it is held unencrypted in memory. The weakness is prevalent in retail POS devices on networks that pass PCI-DSS audits.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk


Follow Us

Join the newsletter!

Error: Please check your email address.

Tags intrusionsecuritydata breachdata protectionmalwarePCI Security Standards Council

Featured

Slideshows

Sizing up the NZ security spectrum - Where's the channel sweet spot?

Sizing up the NZ security spectrum - Where's the channel sweet spot?

From new extortion schemes, outside threats and rising cyber attacks, the art of securing the enterprise has seldom been so complex or challenging. With distance no longer a viable defence, Kiwi businesses are fighting to stay ahead of the security curve. In total, 28 per cent of local businesses faced a cyber attack last year, with the number in New Zealand set to rise in 2017. Yet amidst the sensationalism, media headlines and ongoing high profile breaches, confusion floods the channel, as partners seek strategic methods to combat rising sophistication from attackers. In sizing up the security spectrum, this Reseller News roundtable - in association with F5 Networks, Kaspersky Lab, Tech Data, Sophos and SonicWall - assessed where the channel sweet spot is within the New Zealand channel. Photos by Maria Stefina.

Sizing up the NZ security spectrum - Where's the channel sweet spot?
Show Comments