SlideShare a Scribd company logo
1 of 8
The Threat is Real: 
Protecting Remote Access 
Notice of Confidentiality. This presentation is furnished to you solely in connection with your referral partner relationship with Mercury Payment Systems, LLC (“Mercury”). By accessing, use of, or 
receipt of this presentation, you agree and acknowledge that the information contained herein (the “Information”) is confidential and proprietary information of Mercury. You agree to keep the 
Information confidential and not to forward or otherwise disseminate or use the Information for any purpose other than in connection with your referral partner relationship with Mercury and subject to 
the confidentiality and other terms of the referral partner agreement between you and Mercury. You accept the Information presented herein “as is,” without any representation as to its accuracy or 
completeness.
The Threat is Real 
Mercury Confidential and Proprietary - For Recipient's Internal Use Only 
2 
Improper use of remote access is contributing to the 
growing number of POS attacks on small merchants 
• Recent investigations by the card associations into retail merchant 
breaches indicate that attacks are being aimed at insecure remote 
access. 
• Small merchant breaches are a growing concern. 
• Weak passwords opened the door for the internal intrusion in 31% of 
compromises. 
• Brute force attacks on remote access are on the rise. According to 
Kaspersky Lab, there have been 1,000+ unique attempts each day since 
June 3, 2014. * 
* “A multi-headed battering ram: RDP Bruteforce attacks on the rise.” http://business.kaspersky.com/a-multiheaded-battering-ram-rdp-bruteforce-attacks-on-the-rise/
How Does a Breach Happen? 
Once remote access vulnerabilities are attacked, 
malware is introduced and card numbers are stolen 
• Hackers use publicly available tools to locate businesses that use remote 
desktop applications. 
• Brute force attacks may use the login feature of the remote desktop solution, 
putting administrator accounts at risk. 
• Most applications involving card swipes at the POS leave the cardholder data 
unencrypted and readable in computer memory. 
• Intruders often disable anti-virus applications and establish additional back 
door connectivity through the installation of malware. 
• Malware is installed to collect full track data from the POS system. A 
common example of this malware is “Backoff.” 
Mercury Confidential and Proprietary - For Recipient's Internal Use Only
A newly identified malware strain dubbed “Backoff” 
targets POS merchants and has been linked to numerous 
remote access attacks 
Backoff is a family of POS malware and typically consists of four capabilities: 
1. Scraping memory for track data 
2. Logging keystrokes 
3. Command and control (C2) communication 
4. Injecting malicious stub into explorer.exe 
Keylogging functionality is also present in most recent variants of Backoff. 
Mercury Confidential and Proprietary - For Recipient's Internal Use Only 
4 
Backoff POS Malware 
On July 31, 2014, an advisory was issued about “Backoff Point-of-Sale Malware” and can be found at the following website: 
https://www.us-cert.gov/ncas/alerts/TA14-212A
Are You at Risk? 
If you answer “yes” to any of these questions, 
you are at risk 
Mercury Confidential and Proprietary - For Recipient's Internal Use Only 
5 
1. Do you use remote access to receive maintenance or 
service on your POS? 
2. Can the POS be accessed for service 24/7 without you 
taking action to allow remote access? 
3. Can the POS be accessed without your authorization?
Managing Secure Remote Access 
Follow these eight steps 
to reduce your chances of a data breach 
1. Limit the number of people who can access the system remotely. 
Only allow and provide remote access to those who have a strong business 
need, such as the POS system reseller for the remote service, co-owners, 
management and administrators. 
2. Use complex passwords and two factor authentications for all access in 
the payment environment including POS accounts and remote access. 
Properly store authentication/security tokens and change passwords every 90 
days. 
3. Do not share remote access credentials. 
Ensure that each user with remote access has a unique username and 
password. Do not use the same password for a group or chain of merchants. 
Each merchant location needs a unique username and password. 
Mercury Confidential and Proprietary - For Recipient's Internal Use Only 
6
Managing Secure Remote Access 
4. Disable remote access user accounts when no longer needed and 
disconnect sessions after a specific period of time. 
5. Install and keep anti-virus, anti-spyware and firewalls up-to-date. 
Regularly run and review results of scans for malicious software. 
6. Maintain up-to-date software, operating systems and web browsers at 
all times. Use the latest version of a remote management product or service. 
7. Avoid leaving remote access software on and "listening" for incoming 
connections. Select a remote access package that requires a user at your 
merchant site to start or log on to initiate a remote access session when possible. 
8. Reboot POS systems daily to clear volatile memory, and consider using a 
secure file wiping utility that can securely clear the contents of the page (swap) file. 
Mercury Confidential and Proprietary - For Recipient's Internal Use Only
Thank you!

More Related Content

What's hot

Security models
Security models Security models
Security models LJ PROJECTS
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationCloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationVenkateswar Reddy Melachervu
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access Er. Ajay Sirsat
 
Network security cryptographic hash function
Network security  cryptographic hash functionNetwork security  cryptographic hash function
Network security cryptographic hash functionMijanur Rahman Milon
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notesgangadhar9989166446
 
Cloud computing risk assesment presentation
Cloud computing risk assesment presentationCloud computing risk assesment presentation
Cloud computing risk assesment presentationAhmad El Tawil
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryptionAashish R
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and FirewallShafeeqaFarsana
 

What's hot (20)

Internet Key Exchange Protocol
Internet Key Exchange ProtocolInternet Key Exchange Protocol
Internet Key Exchange Protocol
 
Security models
Security models Security models
Security models
 
PROTOCOL MECHNISM FOR SECURITY ppt
PROTOCOL MECHNISM FOR SECURITY pptPROTOCOL MECHNISM FOR SECURITY ppt
PROTOCOL MECHNISM FOR SECURITY ppt
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationCloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
 
4. system models
4. system models4. system models
4. system models
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
 
Network security cryptographic hash function
Network security  cryptographic hash functionNetwork security  cryptographic hash function
Network security cryptographic hash function
 
Security threats and attacks in cyber security
Security threats and attacks in cyber securitySecurity threats and attacks in cyber security
Security threats and attacks in cyber security
 
Kerberos
KerberosKerberos
Kerberos
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notes
 
Xen & virtualization
Xen & virtualizationXen & virtualization
Xen & virtualization
 
Cloud computing risk assesment presentation
Cloud computing risk assesment presentationCloud computing risk assesment presentation
Cloud computing risk assesment presentation
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
Security policies
Security policiesSecurity policies
Security policies
 
Quality concept
Quality concept Quality concept
Quality concept
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 

Similar to Securing Remote Access

Securing Your Remote Access Desktop Connection
Securing Your Remote Access Desktop ConnectionSecuring Your Remote Access Desktop Connection
Securing Your Remote Access Desktop ConnectionSecurityMetrics
 
What is Remote Buffer Overflow Attack.pdf
What is Remote Buffer Overflow Attack.pdfWhat is Remote Buffer Overflow Attack.pdf
What is Remote Buffer Overflow Attack.pdfuzair
 
Next Gen Firewall buyer's guide
Next Gen Firewall buyer's guideNext Gen Firewall buyer's guide
Next Gen Firewall buyer's guideManage IT Africa
 
PoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail IndustryPoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail IndustryInvincea, Inc.
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?TechSoup
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial PlannersMichael O'Phelan
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight BackMTG IT Professionals
 
5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplaceSameerShaik43
 
How to Build and Validate Ransomware Attack Detections (Secure360)
How to Build and Validate Ransomware Attack Detections (Secure360)How to Build and Validate Ransomware Attack Detections (Secure360)
How to Build and Validate Ransomware Attack Detections (Secure360)Scott Sutherland
 
A software authentication system for the prevention of computer viruses
A software authentication system for the prevention of computer virusesA software authentication system for the prevention of computer viruses
A software authentication system for the prevention of computer virusesUltraUploader
 
Crypto Security Matters: Safeguarding Your Digital Assets
Crypto Security Matters: Safeguarding Your Digital AssetsCrypto Security Matters: Safeguarding Your Digital Assets
Crypto Security Matters: Safeguarding Your Digital AssetsKrypto Cash
 
Mitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed ProgrammerMitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed ProgrammerDigital Shadows
 
FBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareFBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareDavid Sweigert
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank ReportYogesh Kumar
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineeringSweta Kumari Barnwal
 

Similar to Securing Remote Access (20)

Securing Your Remote Access Desktop Connection
Securing Your Remote Access Desktop ConnectionSecuring Your Remote Access Desktop Connection
Securing Your Remote Access Desktop Connection
 
What is Remote Buffer Overflow Attack.pdf
What is Remote Buffer Overflow Attack.pdfWhat is Remote Buffer Overflow Attack.pdf
What is Remote Buffer Overflow Attack.pdf
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Next Gen Firewall buyer's guide
Next Gen Firewall buyer's guideNext Gen Firewall buyer's guide
Next Gen Firewall buyer's guide
 
PoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail IndustryPoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail Industry
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial Planners
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace
 
Securing Devices at Home
Securing Devices at HomeSecuring Devices at Home
Securing Devices at Home
 
How to Build and Validate Ransomware Attack Detections (Secure360)
How to Build and Validate Ransomware Attack Detections (Secure360)How to Build and Validate Ransomware Attack Detections (Secure360)
How to Build and Validate Ransomware Attack Detections (Secure360)
 
ITPG Secure on WannaCry
ITPG Secure on WannaCryITPG Secure on WannaCry
ITPG Secure on WannaCry
 
A software authentication system for the prevention of computer viruses
A software authentication system for the prevention of computer virusesA software authentication system for the prevention of computer viruses
A software authentication system for the prevention of computer viruses
 
Crypto Security Matters: Safeguarding Your Digital Assets
Crypto Security Matters: Safeguarding Your Digital AssetsCrypto Security Matters: Safeguarding Your Digital Assets
Crypto Security Matters: Safeguarding Your Digital Assets
 
Mitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed ProgrammerMitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed Programmer
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
FBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareFBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from Ransomware
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank Report
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
 
Malware
MalwareMalware
Malware
 

More from Granbury Solutions

Gs Customer Conf 2014 Transitions
Gs Customer Conf 2014 TransitionsGs Customer Conf 2014 Transitions
Gs Customer Conf 2014 TransitionsGranbury Solutions
 
Credit Card Processing Industry Response to the Increasingly Tech Savvy Customer
Credit Card Processing Industry Response to the Increasingly Tech Savvy CustomerCredit Card Processing Industry Response to the Increasingly Tech Savvy Customer
Credit Card Processing Industry Response to the Increasingly Tech Savvy CustomerGranbury Solutions
 
Providing Secure and Reliable Public Internet
Providing Secure and Reliable Public InternetProviding Secure and Reliable Public Internet
Providing Secure and Reliable Public InternetGranbury Solutions
 
Continuous Innovations in Hospitality Tech
Continuous Innovations in Hospitality TechContinuous Innovations in Hospitality Tech
Continuous Innovations in Hospitality TechGranbury Solutions
 
2014 Granbury Customer Conference Intro
2014 Granbury Customer Conference Intro2014 Granbury Customer Conference Intro
2014 Granbury Customer Conference IntroGranbury Solutions
 
Build your customer base webinar
Build your customer base webinarBuild your customer base webinar
Build your customer base webinarGranbury Solutions
 
Key Strategies to Build Your Wine Club Business
Key Strategies to Build Your Wine Club BusinessKey Strategies to Build Your Wine Club Business
Key Strategies to Build Your Wine Club BusinessGranbury Solutions
 
Coffee Shop Manager Headquarters Module
Coffee Shop Manager Headquarters ModuleCoffee Shop Manager Headquarters Module
Coffee Shop Manager Headquarters ModuleGranbury Solutions
 
Proven ROI Case Studies for Restaurant Loyalty
Proven ROI Case Studies for Restaurant LoyaltyProven ROI Case Studies for Restaurant Loyalty
Proven ROI Case Studies for Restaurant LoyaltyGranbury Solutions
 
Pat Griswold: Essential Steps to increase sales
Pat Griswold: Essential Steps to increase salesPat Griswold: Essential Steps to increase sales
Pat Griswold: Essential Steps to increase salesGranbury Solutions
 
Grs customer conf pos focus group
Grs customer conf pos focus groupGrs customer conf pos focus group
Grs customer conf pos focus groupGranbury Solutions
 
Grs customer conf 2013 transitions
Grs customer conf 2013 transitionsGrs customer conf 2013 transitions
Grs customer conf 2013 transitionsGranbury Solutions
 
Loyalty best practices conf 2013
Loyalty best practices conf 2013Loyalty best practices conf 2013
Loyalty best practices conf 2013Granbury Solutions
 

More from Granbury Solutions (20)

Gs Customer Conf 2014 Transitions
Gs Customer Conf 2014 TransitionsGs Customer Conf 2014 Transitions
Gs Customer Conf 2014 Transitions
 
Credit Card Processing Industry Response to the Increasingly Tech Savvy Customer
Credit Card Processing Industry Response to the Increasingly Tech Savvy CustomerCredit Card Processing Industry Response to the Increasingly Tech Savvy Customer
Credit Card Processing Industry Response to the Increasingly Tech Savvy Customer
 
The Science of Suggestion
The Science of SuggestionThe Science of Suggestion
The Science of Suggestion
 
Providing Secure and Reliable Public Internet
Providing Secure and Reliable Public InternetProviding Secure and Reliable Public Internet
Providing Secure and Reliable Public Internet
 
Continuous Innovations in Hospitality Tech
Continuous Innovations in Hospitality TechContinuous Innovations in Hospitality Tech
Continuous Innovations in Hospitality Tech
 
2014 Granbury Customer Conference Intro
2014 Granbury Customer Conference Intro2014 Granbury Customer Conference Intro
2014 Granbury Customer Conference Intro
 
Build your customer base webinar
Build your customer base webinarBuild your customer base webinar
Build your customer base webinar
 
Key Strategies to Build Your Wine Club Business
Key Strategies to Build Your Wine Club BusinessKey Strategies to Build Your Wine Club Business
Key Strategies to Build Your Wine Club Business
 
5 Ways to Beat the Big Guys
5 Ways to Beat the Big Guys5 Ways to Beat the Big Guys
5 Ways to Beat the Big Guys
 
Thr!ve beta intro customers
Thr!ve beta intro customersThr!ve beta intro customers
Thr!ve beta intro customers
 
Coffee Shop Manager Headquarters Module
Coffee Shop Manager Headquarters ModuleCoffee Shop Manager Headquarters Module
Coffee Shop Manager Headquarters Module
 
Proven ROI Case Studies for Restaurant Loyalty
Proven ROI Case Studies for Restaurant LoyaltyProven ROI Case Studies for Restaurant Loyalty
Proven ROI Case Studies for Restaurant Loyalty
 
Online ordering tips
Online ordering tipsOnline ordering tips
Online ordering tips
 
Pat Griswold: Essential Steps to increase sales
Pat Griswold: Essential Steps to increase salesPat Griswold: Essential Steps to increase sales
Pat Griswold: Essential Steps to increase sales
 
Grs customer conf pos focus group
Grs customer conf pos focus groupGrs customer conf pos focus group
Grs customer conf pos focus group
 
Grs customer conf 2013 transitions
Grs customer conf 2013 transitionsGrs customer conf 2013 transitions
Grs customer conf 2013 transitions
 
Loyalty best practices conf 2013
Loyalty best practices conf 2013Loyalty best practices conf 2013
Loyalty best practices conf 2013
 
N2 k
N2 kN2 k
N2 k
 
W indows pos (vl and dt)
W indows pos (vl and dt)W indows pos (vl and dt)
W indows pos (vl and dt)
 
Maximizing csm
Maximizing csmMaximizing csm
Maximizing csm
 

Recently uploaded

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

Securing Remote Access

  • 1. The Threat is Real: Protecting Remote Access Notice of Confidentiality. This presentation is furnished to you solely in connection with your referral partner relationship with Mercury Payment Systems, LLC (“Mercury”). By accessing, use of, or receipt of this presentation, you agree and acknowledge that the information contained herein (the “Information”) is confidential and proprietary information of Mercury. You agree to keep the Information confidential and not to forward or otherwise disseminate or use the Information for any purpose other than in connection with your referral partner relationship with Mercury and subject to the confidentiality and other terms of the referral partner agreement between you and Mercury. You accept the Information presented herein “as is,” without any representation as to its accuracy or completeness.
  • 2. The Threat is Real Mercury Confidential and Proprietary - For Recipient's Internal Use Only 2 Improper use of remote access is contributing to the growing number of POS attacks on small merchants • Recent investigations by the card associations into retail merchant breaches indicate that attacks are being aimed at insecure remote access. • Small merchant breaches are a growing concern. • Weak passwords opened the door for the internal intrusion in 31% of compromises. • Brute force attacks on remote access are on the rise. According to Kaspersky Lab, there have been 1,000+ unique attempts each day since June 3, 2014. * * “A multi-headed battering ram: RDP Bruteforce attacks on the rise.” http://business.kaspersky.com/a-multiheaded-battering-ram-rdp-bruteforce-attacks-on-the-rise/
  • 3. How Does a Breach Happen? Once remote access vulnerabilities are attacked, malware is introduced and card numbers are stolen • Hackers use publicly available tools to locate businesses that use remote desktop applications. • Brute force attacks may use the login feature of the remote desktop solution, putting administrator accounts at risk. • Most applications involving card swipes at the POS leave the cardholder data unencrypted and readable in computer memory. • Intruders often disable anti-virus applications and establish additional back door connectivity through the installation of malware. • Malware is installed to collect full track data from the POS system. A common example of this malware is “Backoff.” Mercury Confidential and Proprietary - For Recipient's Internal Use Only
  • 4. A newly identified malware strain dubbed “Backoff” targets POS merchants and has been linked to numerous remote access attacks Backoff is a family of POS malware and typically consists of four capabilities: 1. Scraping memory for track data 2. Logging keystrokes 3. Command and control (C2) communication 4. Injecting malicious stub into explorer.exe Keylogging functionality is also present in most recent variants of Backoff. Mercury Confidential and Proprietary - For Recipient's Internal Use Only 4 Backoff POS Malware On July 31, 2014, an advisory was issued about “Backoff Point-of-Sale Malware” and can be found at the following website: https://www.us-cert.gov/ncas/alerts/TA14-212A
  • 5. Are You at Risk? If you answer “yes” to any of these questions, you are at risk Mercury Confidential and Proprietary - For Recipient's Internal Use Only 5 1. Do you use remote access to receive maintenance or service on your POS? 2. Can the POS be accessed for service 24/7 without you taking action to allow remote access? 3. Can the POS be accessed without your authorization?
  • 6. Managing Secure Remote Access Follow these eight steps to reduce your chances of a data breach 1. Limit the number of people who can access the system remotely. Only allow and provide remote access to those who have a strong business need, such as the POS system reseller for the remote service, co-owners, management and administrators. 2. Use complex passwords and two factor authentications for all access in the payment environment including POS accounts and remote access. Properly store authentication/security tokens and change passwords every 90 days. 3. Do not share remote access credentials. Ensure that each user with remote access has a unique username and password. Do not use the same password for a group or chain of merchants. Each merchant location needs a unique username and password. Mercury Confidential and Proprietary - For Recipient's Internal Use Only 6
  • 7. Managing Secure Remote Access 4. Disable remote access user accounts when no longer needed and disconnect sessions after a specific period of time. 5. Install and keep anti-virus, anti-spyware and firewalls up-to-date. Regularly run and review results of scans for malicious software. 6. Maintain up-to-date software, operating systems and web browsers at all times. Use the latest version of a remote management product or service. 7. Avoid leaving remote access software on and "listening" for incoming connections. Select a remote access package that requires a user at your merchant site to start or log on to initiate a remote access session when possible. 8. Reboot POS systems daily to clear volatile memory, and consider using a secure file wiping utility that can securely clear the contents of the page (swap) file. Mercury Confidential and Proprietary - For Recipient's Internal Use Only