LinuxQuestions.org
Visit Jeremy's Blog.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 01-03-2014, 09:29 AM   #16
Linux_Kidd
Member
 
Registered: Jan 2006
Location: USA
Posts: 737

Original Poster
Rep: Reputation: 78

PCI DSS does not require in-motion card data to be encrypted inside the CDE. granted, better to have encrypt with in-motion data.
CC data sitting needs to be encrypted and some CC data cannot be stored at all, but this encryption usually comes from the storage device or file system, which is useless for a virus that has rights to access the stored data. data at rest really needs to be encrypted by application thus reducing the risk vector down to just the apps, etc.

some news suggests the swipe terminals themselves were all infected. i suspect not, as the ones used at target dont likely have a comm path to the outside world. other news suggests Target had a virus that got onto all of their POS terminals (the OS that runs the software to which swipe terms are connected). this to me sounds like Dexter or variant.however, i am not 100% that Target has a homogenous POS landscpe which makes Dexter less probable to hit every in-store terminal. i am leaning on what others are suggesting, a central aggregate point.

perhaps a lesson for Target is, dont build solutions under aggregation model, use segregated stacks. sure, the latter requires more effort but limits probability of a "got all" attack.

Last edited by Linux_Kidd; 01-03-2014 at 10:56 AM.
 
1 members found this post helpful.
Old 01-03-2014, 02:23 PM   #17
metaschima
Senior Member
 
Registered: Dec 2013
Distribution: Slackware
Posts: 1,982

Rep: Reputation: 492Reputation: 492Reputation: 492Reputation: 492Reputation: 492
There is this article that recommends using EMV chips that contain your info encrypted on the card:
http://it.slashdot.org/story/14/01/0...y-breach-video

However, there exist vulnerabilities for these as well:
http://en.wikipedia.org/wiki/EMV_Chip#Vulnerabilities

I'd say maybe cash + .357 Magnum may be the best
 
Old 01-13-2014, 01:54 PM   #18
metaschima
Senior Member
 
Registered: Dec 2013
Distribution: Slackware
Posts: 1,982

Rep: Reputation: 492Reputation: 492Reputation: 492Reputation: 492Reputation: 492
They have released details on the attack:
http://it.slashdot.org/story/14/01/1...used-in-attack

It was caused by point-of-sales malware, specifically RAM scrapper.
Quote:
According sources who spoke to Reuters, attackers used RAM scraper, or Memory parser malware to steal sensitive data from Target and other retail victims.

Visa issued alerts about attacks utilizing these types of malware in April 2013 (PDF) and again in August 2013 (PDF).

After gaining access to a merchant’s network, attackers can install memory-parsing malware on register systems or backend processing servers to extract magnetic-stripe data as it moves through the through the payment process.

Memory parser malware targets payment card data being processed “in the clear” (unencrypted) in a system’s random access memory (RAM).

“The malware is configured to hook into a payment application binary responsible for processing payment transactions and extracts the systems memory for full track data,” Visa explained in a security advisory.

“These binaries are responsible for processing authorization data, which includes full magnetic-stripe data. When authorization data is processed, the payment application decrypts the transaction on the cash register system or BOH server and stores the authorization data in random access memory (RAM). The data must be decrypted for the authorization to be completed, so hackers are accessing full track data when it is stored in RAM and using malware such as memory-parsers to steal it.”

Visa first warned about these types of attacks targeting grocery merchants, but said merchant segment is vulnerable. According to Visa, these types memory parser malware attacks have been found only targeting Windows-based operating systems.
http://www.securityweek.com/target-c...as-used-attack
 
Old 01-18-2014, 04:09 PM   #19
metaschima
Senior Member
 
Registered: Dec 2013
Distribution: Slackware
Posts: 1,982

Rep: Reputation: 492Reputation: 492Reputation: 492Reputation: 492Reputation: 492
More info on the attack:
http://it.slashdot.org/story/14/01/1...target-malware
It indeed seems that Windoze is required at the point of sale for this attack to work.
 
1 members found this post helpful.
Old 01-18-2014, 11:34 PM   #20
Linux_Kidd
Member
 
Registered: Jan 2006
Location: USA
Posts: 737

Original Poster
Rep: Reputation: 78
yep, as i was figuring, a variant of Dexter.

it still baffles me as to why from card swipe there is any non-encrypted data anywhere. the simple use of PKI would rid this problem. public key on the swipe terminal, data is decrypted on processor side, tokenization used for the approval/denial, etc.

even swipe terminals can be hacked, but way harder to do so then infecting the stupid OS that has the application. why in the world are POS terminals using Windows??? mistake #1.

other news has a C2 server in Target network, from there they carefully deployed hack to many of the POS terminals. where's the IDS/IPS, where's the anomalous detection??? omg Target, are you kidding.

someone needs to request their PCI ROC !!!

Last edited by Linux_Kidd; 01-18-2014 at 11:37 PM.
 
Old 01-23-2014, 11:38 AM   #21
metaschima
Senior Member
 
Registered: Dec 2013
Distribution: Slackware
Posts: 1,982

Rep: Reputation: 492Reputation: 492Reputation: 492Reputation: 492Reputation: 492
Looks like info on the breach is being wiped from the net by security companies:
http://www.computerworld.com.au/arti...shes_from_web/
 
1 members found this post helpful.
Old 01-30-2014, 01:58 PM   #22
frankbell
LQ Guru
 
Registered: Jan 2006
Location: Virginia, USA
Distribution: Slackware, Ubuntu MATE, Mageia, and whatever VMs I happen to be playing with
Posts: 19,323
Blog Entries: 28

Rep: Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141
The NetSec podcast finally addressed this situation; it's in the early part of this episode. They were delayed in getting to it because one of the podcasters was moving from the US to the UK at the end of last year.

http://netsecpodcast.com/?p=1289

You might find it an interesting listen.
 
Old 01-30-2014, 02:04 PM   #23
metaschima
Senior Member
 
Registered: Dec 2013
Distribution: Slackware
Posts: 1,982

Rep: Reputation: 492Reputation: 492Reputation: 492Reputation: 492Reputation: 492
Also note that this kind of breach is not limited to Target. Similar breaches have been reported for Nieman Marcus and Michaels:
http://krebsonsecurity.com/2014/01/s...chaels-stores/

They seem to also be point-of-sales malware related.
 
Old 02-14-2014, 04:29 PM   #24
metaschima
Senior Member
 
Registered: Dec 2013
Distribution: Slackware
Posts: 1,982

Rep: Reputation: 492Reputation: 492Reputation: 492Reputation: 492Reputation: 492
Looks like their security team warned management about it and were ignored:
http://it.slashdot.org/story/14/02/1...ned-management
 
Old 02-17-2014, 02:47 PM   #25
Linux_Kidd
Member
 
Registered: Jan 2006
Location: USA
Posts: 737

Original Poster
Rep: Reputation: 78
Quote:
Originally Posted by metaschima View Post
Looks like their security team warned management about it and were ignored:
http://it.slashdot.org/story/14/02/1...ned-management
i deal with this all the time. i get paid good $$ to be a security advisor. i have made many suggestions where management just didnt see the value-add. i mark these items on my side as "declined by customer, risk accepted by customer management". in the end, it's customer owners (whoever that may be) are the ones who own the risk.

Target upper management either had a good insurance plan for such risk, or they were negligent of the matter. my guess is, the 1st is likely the case given this article.

did Target have a passing ROC for PCI (either by 3rd party or did they have a ISA?)???
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
How do I find the target directory (not the target fs) of a mount -bind raananh Linux - Newbie 2 01-13-2013 09:18 AM
iptables: rule with RETURN target just after a rule with ACCEPT target Nerox Linux - Networking 6 09-04-2011 03:33 PM
Making a symlink follow its target when the target moves pwabrahams Linux - Software 3 03-08-2011 07:04 PM
Possible ssh breach xtremeclones Linux - Security 12 07-13-2006 04:44 PM
Possible breach Mig21 Linux - Security 2 07-05-2005 08:43 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 11:27 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration