Homeland Security Warns Of New ‘Backoff’ Point-Of-Sale Malware - TopicsExpress



          

Homeland Security Warns Of New ‘Backoff’ Point-Of-Sale Malware b4in.org/h6VX The US Department of Homeland Security (DHS) is warning telecommuting employees and independent contractors about a new type of malware that can be used to infiltrate retailer computer systems. In a lengthy report issued Thursday, the DHS said the hackers force their way into administrator-level or restricted-access accounts through remote desktop software such as those offered by Microsoft, Apple and Google. Once they gain access, they then deploy the point-of-sale (PoS) malware program known as Backoff to extract consumer payment information using an encrypted POST request. The DHS describes Backoff as a family of PoS malware that has been linked to at least three separate cyberattacks, according to CIO Today’s Shirley Siluk. It was first detected in October 2013, and several new versions have been identified since then. Furthermore, some variants of the malware are said to be largely undetectable by standard antivirus programs. “It’s completely new malware. Nobody has seen it before,” Karl Sigler, manager of threat Relevant Products/Services security at Chicago-based computer security firm Trustwave (which assisted in the preparation of the report), told Siluk. Despite the previous difficulties in detecting Backoff, however, Sigler and her colleagues believe that the public release of the report could help antivirus companies develop new ways to protect against the threat. According to Charlie Osborne of ZDNet, the 10-page document says that Backoff could not only harm businesses, but could also allow sensitive information such as customer names, addresses and credit card numbers to fall into the wrong hands – allowing hackers to use the information to make fraudulent purchases or commit identify theft. “For limiting the risk of compromise with this malware, organizations should educate employees and provide an approved method for remote access. Companies should also perform network scans to see if systems have specific ports enabled to provide the remote access services, then follow up to turn off the service,” Joe Schumacher, security consultant at security and risk management consulting company Neohapsis, told Osborne. More b4in.org/h6VX
Posted on: Sat, 02 Aug 2014 17:05:54 +0000

© 2015