Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Skimmers are Getting Lucky – The Need to Improve Security of POS Systems

Sometime around the beginning of November, thieves managed to insert an additional circuit board into the self checkout Point of Sale (POS) machines Lucky’s stores in the San Francisco Bay Area. Since then, the company has collected more than 80 consumer and employee reports of fraudulent attempt to access bank account data. Unfortunately, there is nothing new or novel about this attack, only that it continues to happen in the age of smart embedded systems and PCI.

Sometime around the beginning of November, thieves managed to insert an additional circuit board into the self checkout Point of Sale (POS) machines Lucky’s stores in the San Francisco Bay Area. Since then, the company has collected more than 80 consumer and employee reports of fraudulent attempt to access bank account data. Unfortunately, there is nothing new or novel about this attack, only that it continues to happen in the age of smart embedded systems and PCI.

Skimming is the practice of copying the credit or debit card data as it is swiped at a POS. The copied data is then either radioed via SMS or cellular connection, or stored for later, physical pickup. Often the card holder is unaware the additional hardware exists—until law enforcement or the media report the compromise.

Card SkimmingGas pumps present the hardest problem, since they are often unattended and available twenty-four hours a day. Last Spring, the Los Angeles Sheriff’s Department concluded a three-year investigation into a credit card fraud and identity theft ring that was using “skimmers” to capture credit and debit card information, including PIN codes, at a number of computerized gas station pumps along the West Coast. The devices stored the card information until downloaded remotely by the thieves and re-encoded onto the magnetic strips of other cards. The criminals were then able to use the stolen card numbers–of which they had over 10,000 when arrested–to make purchases. Los Angeles authorities arrested three people in connection with the fraud ring and seized luxury vehicles as well as $40,000 in cash.

In the case of Michaels last Spring, law enforcement and bank authorities informed the art supply store of fraudulent activity traced back to approximately 70 terminals inside its stores. The frauds where generally multiple and unauthorized withdrawals of up to $500 made from ATMs on the West Coast against accounts first captured by the compromised systems at Michaels stores. For this scam, typically a network of organized criminals across the country somehow distract individual store personnel long enough to swap out the PIN pads at the cash register with compromised, look-alike devices.

The Lucky’s card-swipe stations were also located inside the stores. To add components to the self check out stations, employees may have been enlisted to install the additional hardware, however, the San Jose Mercury News writes that the company doesn’t believe it was an inside job. Either way, the attack was timed to coincide with busy holiday shopping.

In 2010, the Payment Card Industry (PCI) Security Standards Council did issue guidance around skimming attacks such as this. Recommendations include writing down the serial numbers of the PIN pads in the store, then periodically checking to make sure those devices remain in the store. The council also recommends inspecting each PIN pad for evidence of tampering. That happened at Lucky’s: an alert employee noticed something was different about one compromised machine.

A better solution would be for the POS systems to authenticate the hardware being used for payment. New or otherwise compromised units would be rejected or at least flagged by the POS systems. Unfortunately, the additional costs to merchants to install these units is prohibitive.

Another proposal is EMV, an algorithm created by EuroPay, MasterCard and Visa that is embedded on a chip within a credit card and designed to combat face-to-face fraud. But, again this would not work with stand alone systems. In a talk at CanSecWest in March 2011 Researchers Andrea Barisani and Daniele Bianco, both of Inversepath, and Adam Laurie and Zac Franken, both of Aperture Labs, found specific ways to circumvent the real world POS security touted by EMV. In a subsequent presentation, they showed how EMV is also an ineffective defense online against what’s called Card Not Present (CNP) fraud.

The US has yet to adopt EMV and with the launch of NFC-based Google Wallet and with similar initiatives expected from other financial services companies, it seems likely that NFC may soon replace both magnetic strip and EMV credit cards worldwide.

Advertisement. Scroll to continue reading.

In the meantime, however, we’re still left struggling against very low level skimming attacks on our magnetic cards.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.