{"id":3352,"date":"2014-05-16T10:00:36","date_gmt":"2014-05-16T14:00:36","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=3352"},"modified":"2020-02-26T18:58:37","modified_gmt":"2020-02-26T14:58:37","slug":"news-points-of-sale-under-attack","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/news-points-of-sale-under-attack\/3352\/","title":{"rendered":"A Week in the News: Sale Terminals at Risk"},"content":{"rendered":"<p>A new study reveals that point-of-sale terminals are poorly secured and facing ever-sophisticated threats, the second Tuesday of the month means security fixes from all of your favorite software vendors, and the popular link shortening service Bitly admits to being compromised by unknown attackers.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/05\/05111245\/week1-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4796\" alt=\"week\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/05\/05111245\/week1-1.jpg\" width=\"640\" height=\"480\"><\/a><\/p>\n<p><b>Points-of-Sale<\/b><\/p>\n<p>Point-of-sale\u2013or PoS\u2013is just a fancy name for a cash register. Of course, we aren\u2019t talking about old-timey, bell ringing cash registers. We\u2019re talking about connected, electronic sale terminals that store and pass along payment information. A PoS system of one kind or another is present in nearly every retail location or restaurant that accepts debit or credit cards. Unfortunately, a new report finds that these systems, on which many of us very regularly conduct financial transactions, <a href=\"https:\/\/threatpost.com\/points-of-sale-poorly-secured-facing-sophisticated-attacks\/106027\" target=\"_blank\" rel=\"noopener nofollow\">are facing an increasingly complex array of attacks<\/a>. Worse yet, most of them do not offer much in the way of security protections.<\/p>\n<p>This reality really isn\u2019t all that surprising, given that a compromised PoS terminal could potentially yield all pertinent payment information about any credit or debit card processed in a transaction on that machine.<\/p>\n<div class=\"pullquote\">Bitly was compromised this week and is urging users to change passwords. Point-of-sale systems are poorly secured. And fixes from Microsoft on Patch Tuesday.<\/div>\n<p>A recent Arbor Networks report named at least five separate pieces of malware designed exclusively for the purpose of attacking PoS systems. Furthermore, the <a href=\"https:\/\/threatpost.com\/dbir-poor-patching-weak-credentials-open-door-to-data-breaches\/105619\" target=\"_blank\" rel=\"noopener nofollow\">Verizon data breach investigation report<\/a> noted there were 198 distinct PoS intrusions in 2013. Also, in case you were wondering, recent attacks on Target, Nieman Marcus, Michael\u2019s and other retailers were all PoS attacks and all spilt substantial consumer data.<\/p>\n<p>What can you do about it? Well, you could burn all your credit and debit cards and conduct only cash transactions until this whole \u201cInternet\u201d thing blows over. That\u2019s pretty extreme, though. Your best course of action is to pay attention to the news and act fast when you hear about a breach at a company you\u2019ve patronized. You\u2019ll want to check your credit or debit card balances to make sure nothing is amiss and also contact your bank to cancel any potentially exposed cards and replace them with new ones.<\/p>\n<p><b>Bitly Broken<\/b><\/p>\n<p>The popular link shortening service <a href=\"https:\/\/threatpost.com\/bitly-compromised-users-urged-to-change-passwords\/106006\" target=\"_blank\" rel=\"noopener nofollow\">Bitly was compromised late last week<\/a>. This means if you have or ever had a Bitly account, then you should consider the password you used for that account exposed. While the company believes that no user-accounts were or are at risk, it is still urging its customers to change their passwords. <a href=\"https:\/\/threatpost.com\/bitly-developing-two-factor-authentication-following-compromise\/106048\" target=\"_blank\" rel=\"noopener nofollow\">Bitly has also announced<\/a> that it is implementing <a href=\"https:\/\/www.kaspersky.com\/blog\/podcast-two-factor-authentication\/\" target=\"_blank\" rel=\"noopener nofollow\">two-factor authentication<\/a> as a result of the breach.<\/p>\n<p>I will also urge you to change your Bitly account password if you have one. If you happened to use that same password for other accounts, then you are going to want to change the passwords for those services as well, which is why you should never use the same password on multiple accounts.<\/p>\n<p>One last thing to point out, Bitly allows its users to link their Bitly account with their Facebook and Twitter accounts. This could have been problematic\u2013allowing an attacker with access to your Bitly account potential access to your social accounts as well, but Bitly smartly invalidated all of those connections. You will have to re-authenticate those connections if you would like to reconnect the accounts. Unfortunately, you will also want to change the password for any social account you had linked with Bitly.<\/p><blockquote class=\"twitter-pullquote\"><p>Make sure you\u2019re up-to-date with the latest versions of your Microsoft and Adobe software and Chrome, too.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FTW7o&amp;text=Make+sure+you%26%238217%3Bre+up-to-date+with+the+latest+versions+of+your+Microsoft+and+Adobe+software+and+Chrome%2C+too.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p><b>Patch Tuesday<\/b><\/p>\n<p>Briefly, Patch Tuesday was this week, which means fixes for Adobe\u2019s and Microsoft\u2019s ubiquitous products, as well as patches for Google Chrome. <a href=\"https:\/\/threatpost.com\/microsoft-adobe-issue-critical-fixes-for-may-2014-patch-tuesday\/106062\" target=\"_blank\" rel=\"noopener nofollow\">Microsoft issued eight security bulletins<\/a>\u2013of which two were critical\u2013fixing some 13 security vulnerabilities in its Internet Explorer Web browser and more in its other software. Adobe fixed some critical bugs in its Reader, Acrobat, and Flash players. Google fixed three <a href=\"https:\/\/threatpost.com\/google-fixes-three-critical-chrome-vulnerabilities\/106094\" target=\"_blank\" rel=\"noopener nofollow\">highly rated security vulnerabilities in its Chrome browser<\/a> (and paid $4500 to the researchers that found and reported the bugs).<\/p>\n<p>While we\u2019re at it, in the off chance that you want to get into some real insider-baseball stuff, we may as well mention that there was a fix for a <a href=\"https:\/\/threatpost.com\/five-year-old-security-vulnerability-patched-in-linux-kernel\/106104\" target=\"_blank\" rel=\"noopener nofollow\">five-year-old vulnerability in the Linux kernel<\/a> and also a couple patches for some <a href=\"https:\/\/threatpost.com\/buffer-overflows-patched-in-yokogawa-control-system-products\/106074\" target=\"_blank\" rel=\"noopener nofollow\">Yokogawa industrial infrastructure gear<\/a>.<\/p>\n<p>Make sure you\u2019re up-to-date with the latest versions of your Microsoft and Adobe software and Chrome, too. You should also check on your Yokogawa systems and Linux distributions if you are into that sort of stuff.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bitly was compromised this week and is urging users to change passwords. Point-of-sale systems are poorly secured. And fixes from Microsoft on Patch Tuesday.<\/p>\n","protected":false},"author":42,"featured_media":3353,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[632,543,97],"class_list":{"0":"post-3352","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-bitly","9":"tag-news-2","10":"tag-security-2"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/news-points-of-sale-under-attack\/3352\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/news-points-of-sale-under-attack\/3463\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/news-points-of-sale-under-attack\/3774\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/news-points-of-sale-under-attack\/3893\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/news-points-of-sale-under-attack\/4795\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/news-points-of-sale-under-attack\/3692\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/news-points-of-sale-under-attack\/4795\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/news-points-of-sale-under-attack\/4795\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/bitly\/","name":"bitly"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3352","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=3352"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3352\/revisions"}],"predecessor-version":[{"id":15781,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3352\/revisions\/15781"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/3353"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=3352"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=3352"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=3352"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}