⚠ We would appreciate if you would disable your ad blocker when visiting our site! ⚠

Every Key You Make, Every Stroke You Take, They'll be watching you

Order a reprint of this story
Close (X)
ORDER A REPRINT

To reprint an article or any part of an article from Hospitality Upgrade please email geneva@hospitalityupgrade.com. Fee is $250 per reprint. One-time reprint. Fee may be waived under certain circumstances.

SEND EMAIL

June 01, 2010
Data Security
Ingrid Beierly

View Magazine Version of This Article

Criminals have a reputation for being resourceful and relentless in their attempts to steal payment card information. A recent trend targeting the hospitality industry and other merchant sectors provides a strong case in point.

Visa has recently found an increase of criminal instances of keystroke logging (also referred to as key logging) through the course of analyzing payment card data security breaches. This criminal tactic intercepts every stroke typed into a victim’s computer keyboard and records this information to be retrieved. Most of their victims have no idea this is occurring. In the hospitality industry and for other merchants, this means that without proper safeguards in place, you may be unknowingly transmitting your customers’ payment card information and other sensitive data directly to hackers.

Key loggers, like most forms of malware, can be distributed as part of a Trojan horse, a virus or other malware, sent via e-mail (as an attachment or by clicking to an infected Web link or site) or, in the worst cases, are installed by a hacker with unauthorized direct access to a victim’s computer.

The particular key logger malware identified by Visa is equipped to send payment card data to a fixed e-mail or IP address accessible to the hacker. In these instances, the hacker is able to install key logger malware on the point of sale (POS) system.

This system vulnerability is generally due to insecure remote access and poor network configuration which allows criminals unauthorized and unfettered access. Based on forensic review of the malware, it uses file transfer protocol (FTP) and simple mail transfer protocol (SMTP) on default ports (20, 21 and 25 respectively) to send data out of the network.

Recommended Mitigation Strategy
Although key loggers can be difficult to detect, the following measures that support an organization’s Payment Card Industry Data Security Standard (PCI DSS) compliance should be used to mitigate the risk of exposure to critical systems, such as POS systems, payment processing servers, database servers or other servers where cardholder data resides:

Remove unnecessary remote access. If remote connectivity is required, secure remote access by turning on remote access only when needed. Do not use default or trivial passwords; only use remote access applications that offer strong security controls. Always use two-factor authentication.

Implement a secure network configuration. Organizations must have a dedicated firewall and must implement strict network traffic ingress (inbound) and egress (outbound) filtering to only allow those ports/services necessary to conduct business. Disable FTP, SMTP and other insecure ports if your organization does not require these services.

Constantly observe which software programs are installed on their systems, determine any unknown applications, and take appropriate actions (e.g., remove, disable, configure properly, etc.) to mitigate the risk of a compromise.

Periodically check for any unknown devices connected to systems, including devices connected to keyboards and/or mice.

Check your systems against the known key logger malware signatures that Visa has collected from forensic investigations (see chart below).
Implement the latest anti-virus engine and signature files to detect known malware. If heuristic technology is available on an organization’s anti-virus product, enable it to detect unknown malware. Most anti-virus software will detect off-the-shelf key loggers.

Implement anti-spyware applications to detect key loggers and cleanse them from applicable systems.

Monitor your network and host. Monitoring can alert organizations whenever a software application attempts to contact malicious IP addresses or when malicious IP addresses attempt to contact your network. This action will give organizations a chance to prevent key loggers from exporting sensitive data from the network.

If you suspect that you’ve become a victim of key stroke logging or if you detect a security breach, notify your acquiring bank immediately. You can also contact Visa Fraud Control at usfraudcontrol@visa.com. For more information, please refer to Visa’s What To Do If Compromised document available at www.visa.com/cisp.
 

©2010 Hospitality Upgrade
This work may not be reprinted, redistributed or repurposed without written consent.
For permission requests, call 678.802.5302 or email info@hospitalityupgrade.com.

 

www.visa.com/cisp


want to read more articles like this?

want to read more articles like this?

Sign up to receive our twice-a-month Watercooler and Siegel Sez Newsletters and never miss another article or news story.