SlideShare a Scribd company logo
The Threat is Real: 
Protecting Remote Access 
Notice of Confidentiality. This presentation is furnished to you solely in connection with your referral partner relationship with Mercury Payment Systems, LLC (“Mercury”). By accessing, use of, or 
receipt of this presentation, you agree and acknowledge that the information contained herein (the “Information”) is confidential and proprietary information of Mercury. You agree to keep the 
Information confidential and not to forward or otherwise disseminate or use the Information for any purpose other than in connection with your referral partner relationship with Mercury and subject to 
the confidentiality and other terms of the referral partner agreement between you and Mercury. You accept the Information presented herein “as is,” without any representation as to its accuracy or 
completeness.
The Threat is Real 
Mercury Confidential and Proprietary - For Recipient's Internal Use Only 
2 
Improper use of remote access is contributing to the 
growing number of POS attacks on small merchants 
• Recent investigations by the card associations into retail merchant 
breaches indicate that attacks are being aimed at insecure remote 
access. 
• Small merchant breaches are a growing concern. 
• Weak passwords opened the door for the internal intrusion in 31% of 
compromises. 
• Brute force attacks on remote access are on the rise. According to 
Kaspersky Lab, there have been 1,000+ unique attempts each day since 
June 3, 2014. * 
* “A multi-headed battering ram: RDP Bruteforce attacks on the rise.” http://business.kaspersky.com/a-multiheaded-battering-ram-rdp-bruteforce-attacks-on-the-rise/
How Does a Breach Happen? 
Once remote access vulnerabilities are attacked, 
malware is introduced and card numbers are stolen 
• Hackers use publicly available tools to locate businesses that use remote 
desktop applications. 
• Brute force attacks may use the login feature of the remote desktop solution, 
putting administrator accounts at risk. 
• Most applications involving card swipes at the POS leave the cardholder data 
unencrypted and readable in computer memory. 
• Intruders often disable anti-virus applications and establish additional back 
door connectivity through the installation of malware. 
• Malware is installed to collect full track data from the POS system. A 
common example of this malware is “Backoff.” 
Mercury Confidential and Proprietary - For Recipient's Internal Use Only
A newly identified malware strain dubbed “Backoff” 
targets POS merchants and has been linked to numerous 
remote access attacks 
Backoff is a family of POS malware and typically consists of four capabilities: 
1. Scraping memory for track data 
2. Logging keystrokes 
3. Command and control (C2) communication 
4. Injecting malicious stub into explorer.exe 
Keylogging functionality is also present in most recent variants of Backoff. 
Mercury Confidential and Proprietary - For Recipient's Internal Use Only 
4 
Backoff POS Malware 
On July 31, 2014, an advisory was issued about “Backoff Point-of-Sale Malware” and can be found at the following website: 
https://www.us-cert.gov/ncas/alerts/TA14-212A
Are You at Risk? 
If you answer “yes” to any of these questions, 
you are at risk 
Mercury Confidential and Proprietary - For Recipient's Internal Use Only 
5 
1. Do you use remote access to receive maintenance or 
service on your POS? 
2. Can the POS be accessed for service 24/7 without you 
taking action to allow remote access? 
3. Can the POS be accessed without your authorization?
Managing Secure Remote Access 
Follow these eight steps 
to reduce your chances of a data breach 
1. Limit the number of people who can access the system remotely. 
Only allow and provide remote access to those who have a strong business 
need, such as the POS system reseller for the remote service, co-owners, 
management and administrators. 
2. Use complex passwords and two factor authentications for all access in 
the payment environment including POS accounts and remote access. 
Properly store authentication/security tokens and change passwords every 90 
days. 
3. Do not share remote access credentials. 
Ensure that each user with remote access has a unique username and 
password. Do not use the same password for a group or chain of merchants. 
Each merchant location needs a unique username and password. 
Mercury Confidential and Proprietary - For Recipient's Internal Use Only 
6
Managing Secure Remote Access 
4. Disable remote access user accounts when no longer needed and 
disconnect sessions after a specific period of time. 
5. Install and keep anti-virus, anti-spyware and firewalls up-to-date. 
Regularly run and review results of scans for malicious software. 
6. Maintain up-to-date software, operating systems and web browsers at 
all times. Use the latest version of a remote management product or service. 
7. Avoid leaving remote access software on and "listening" for incoming 
connections. Select a remote access package that requires a user at your 
merchant site to start or log on to initiate a remote access session when possible. 
8. Reboot POS systems daily to clear volatile memory, and consider using a 
secure file wiping utility that can securely clear the contents of the page (swap) file. 
Mercury Confidential and Proprietary - For Recipient's Internal Use Only
Thank you!

More Related Content

What's hot

Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
Edureka!
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
PECB
 
Chapter 3 Presentation
Chapter 3 PresentationChapter 3 Presentation
Chapter 3 Presentation
Amy McMullin
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
Allan Pratt MBA
 
Ransomware
RansomwareRansomware
Ransomware
Akshita Pillai
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
Bill Gardner
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
ChandanChandu928137
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
LearningwithRayYT
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
Prakashchand Suthar
 
Chapter 11 laws and ethic information security
Chapter 11   laws and ethic information securityChapter 11   laws and ethic information security
Chapter 11 laws and ethic information security
Syaiful Ahdan
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Vaishak Chandran
 
Cyber security landscape
Cyber security landscapeCyber security landscape
Cyber security landscape
Jisc
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptx
GulnurAzat
 
Cyber Threat Hunting Training (CCTHP)
Cyber Threat Hunting Training (CCTHP)Cyber Threat Hunting Training (CCTHP)
Cyber Threat Hunting Training (CCTHP)
ENOInstitute
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
cclark_isec
 
Network security policies
Network security policiesNetwork security policies
Network security policies
Usman Mukhtar
 
Cyber-Security in Education
Cyber-Security in EducationCyber-Security in Education
Cyber-Security in Education
Tyrone Grandison
 
Cyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation SlidesCyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation Slides
SlideTeam
 
Computer Security
Computer SecurityComputer Security
Computer Security
Frederik Questier
 
Cyber security
Cyber securityCyber security
Cyber security
Bhavin Shah
 

What's hot (20)

Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
Chapter 3 Presentation
Chapter 3 PresentationChapter 3 Presentation
Chapter 3 Presentation
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Ransomware
RansomwareRansomware
Ransomware
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Chapter 11 laws and ethic information security
Chapter 11   laws and ethic information securityChapter 11   laws and ethic information security
Chapter 11 laws and ethic information security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security landscape
Cyber security landscapeCyber security landscape
Cyber security landscape
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptx
 
Cyber Threat Hunting Training (CCTHP)
Cyber Threat Hunting Training (CCTHP)Cyber Threat Hunting Training (CCTHP)
Cyber Threat Hunting Training (CCTHP)
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Network security policies
Network security policiesNetwork security policies
Network security policies
 
Cyber-Security in Education
Cyber-Security in EducationCyber-Security in Education
Cyber-Security in Education
 
Cyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation SlidesCyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation Slides
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Securing Remote Access

Securing Your Remote Access Desktop Connection
Securing Your Remote Access Desktop ConnectionSecuring Your Remote Access Desktop Connection
Securing Your Remote Access Desktop Connection
SecurityMetrics
 
What is Remote Buffer Overflow Attack.pdf
What is Remote Buffer Overflow Attack.pdfWhat is Remote Buffer Overflow Attack.pdf
What is Remote Buffer Overflow Attack.pdf
uzair
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
Surya Bathulapalli
 
Next Gen Firewall buyer's guide
Next Gen Firewall buyer's guideNext Gen Firewall buyer's guide
Next Gen Firewall buyer's guide
Manage IT Africa
 
PoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail IndustryPoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail Industry
Invincea, Inc.
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
TechSoup
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial Planners
Michael O'Phelan
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
MTG IT Professionals
 
5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace
SameerShaik43
 
Securing Devices at Home
Securing Devices at HomeSecuring Devices at Home
Securing Devices at Home
Symptai Consulting Limited
 
How to Build and Validate Ransomware Attack Detections (Secure360)
How to Build and Validate Ransomware Attack Detections (Secure360)How to Build and Validate Ransomware Attack Detections (Secure360)
How to Build and Validate Ransomware Attack Detections (Secure360)
Scott Sutherland
 
ITPG Secure on WannaCry
ITPG Secure on WannaCryITPG Secure on WannaCry
Common Types of Cyber Attacks & How to Prevent Them.pptx
Common Types of Cyber Attacks & How to Prevent Them.pptxCommon Types of Cyber Attacks & How to Prevent Them.pptx
Common Types of Cyber Attacks & How to Prevent Them.pptx
KalponikPrem
 
A software authentication system for the prevention of computer viruses
A software authentication system for the prevention of computer virusesA software authentication system for the prevention of computer viruses
A software authentication system for the prevention of computer viruses
UltraUploader
 
Crypto Security Matters: Safeguarding Your Digital Assets
Crypto Security Matters: Safeguarding Your Digital AssetsCrypto Security Matters: Safeguarding Your Digital Assets
Crypto Security Matters: Safeguarding Your Digital Assets
Krypto Cash
 
Mitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed ProgrammerMitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed Programmer
Digital Shadows
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
Sweta Kumari Barnwal
 
FBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareFBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from Ransomware
David Sweigert
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank Report
Yogesh Kumar
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
Sweta Kumari Barnwal
 

Similar to Securing Remote Access (20)

Securing Your Remote Access Desktop Connection
Securing Your Remote Access Desktop ConnectionSecuring Your Remote Access Desktop Connection
Securing Your Remote Access Desktop Connection
 
What is Remote Buffer Overflow Attack.pdf
What is Remote Buffer Overflow Attack.pdfWhat is Remote Buffer Overflow Attack.pdf
What is Remote Buffer Overflow Attack.pdf
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Next Gen Firewall buyer's guide
Next Gen Firewall buyer's guideNext Gen Firewall buyer's guide
Next Gen Firewall buyer's guide
 
PoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail IndustryPoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail Industry
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial Planners
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace
 
Securing Devices at Home
Securing Devices at HomeSecuring Devices at Home
Securing Devices at Home
 
How to Build and Validate Ransomware Attack Detections (Secure360)
How to Build and Validate Ransomware Attack Detections (Secure360)How to Build and Validate Ransomware Attack Detections (Secure360)
How to Build and Validate Ransomware Attack Detections (Secure360)
 
ITPG Secure on WannaCry
ITPG Secure on WannaCryITPG Secure on WannaCry
ITPG Secure on WannaCry
 
Common Types of Cyber Attacks & How to Prevent Them.pptx
Common Types of Cyber Attacks & How to Prevent Them.pptxCommon Types of Cyber Attacks & How to Prevent Them.pptx
Common Types of Cyber Attacks & How to Prevent Them.pptx
 
A software authentication system for the prevention of computer viruses
A software authentication system for the prevention of computer virusesA software authentication system for the prevention of computer viruses
A software authentication system for the prevention of computer viruses
 
Crypto Security Matters: Safeguarding Your Digital Assets
Crypto Security Matters: Safeguarding Your Digital AssetsCrypto Security Matters: Safeguarding Your Digital Assets
Crypto Security Matters: Safeguarding Your Digital Assets
 
Mitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed ProgrammerMitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed Programmer
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
FBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareFBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from Ransomware
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank Report
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
 

More from Granbury Solutions

Gs Customer Conf 2014 Transitions
Gs Customer Conf 2014 TransitionsGs Customer Conf 2014 Transitions
Gs Customer Conf 2014 Transitions
Granbury Solutions
 
Credit Card Processing Industry Response to the Increasingly Tech Savvy Customer
Credit Card Processing Industry Response to the Increasingly Tech Savvy CustomerCredit Card Processing Industry Response to the Increasingly Tech Savvy Customer
Credit Card Processing Industry Response to the Increasingly Tech Savvy Customer
Granbury Solutions
 
The Science of Suggestion
The Science of SuggestionThe Science of Suggestion
The Science of Suggestion
Granbury Solutions
 
Providing Secure and Reliable Public Internet
Providing Secure and Reliable Public InternetProviding Secure and Reliable Public Internet
Providing Secure and Reliable Public Internet
Granbury Solutions
 
Continuous Innovations in Hospitality Tech
Continuous Innovations in Hospitality TechContinuous Innovations in Hospitality Tech
Continuous Innovations in Hospitality Tech
Granbury Solutions
 
2014 Granbury Customer Conference Intro
2014 Granbury Customer Conference Intro2014 Granbury Customer Conference Intro
2014 Granbury Customer Conference Intro
Granbury Solutions
 
Build your customer base webinar
Build your customer base webinarBuild your customer base webinar
Build your customer base webinar
Granbury Solutions
 
Key Strategies to Build Your Wine Club Business
Key Strategies to Build Your Wine Club BusinessKey Strategies to Build Your Wine Club Business
Key Strategies to Build Your Wine Club Business
Granbury Solutions
 
5 Ways to Beat the Big Guys
5 Ways to Beat the Big Guys5 Ways to Beat the Big Guys
5 Ways to Beat the Big Guys
Granbury Solutions
 
Thr!ve beta intro customers
Thr!ve beta intro customersThr!ve beta intro customers
Thr!ve beta intro customers
Granbury Solutions
 
Coffee Shop Manager Headquarters Module
Coffee Shop Manager Headquarters ModuleCoffee Shop Manager Headquarters Module
Coffee Shop Manager Headquarters Module
Granbury Solutions
 
Proven ROI Case Studies for Restaurant Loyalty
Proven ROI Case Studies for Restaurant LoyaltyProven ROI Case Studies for Restaurant Loyalty
Proven ROI Case Studies for Restaurant Loyalty
Granbury Solutions
 
Online ordering tips
Online ordering tipsOnline ordering tips
Online ordering tips
Granbury Solutions
 
Pat Griswold: Essential Steps to increase sales
Pat Griswold: Essential Steps to increase salesPat Griswold: Essential Steps to increase sales
Pat Griswold: Essential Steps to increase sales
Granbury Solutions
 
Grs customer conf pos focus group
Grs customer conf pos focus groupGrs customer conf pos focus group
Grs customer conf pos focus group
Granbury Solutions
 
Grs customer conf 2013 transitions
Grs customer conf 2013 transitionsGrs customer conf 2013 transitions
Grs customer conf 2013 transitions
Granbury Solutions
 
Loyalty best practices conf 2013
Loyalty best practices conf 2013Loyalty best practices conf 2013
Loyalty best practices conf 2013
Granbury Solutions
 
N2 k
N2 kN2 k
W indows pos (vl and dt)
W indows pos (vl and dt)W indows pos (vl and dt)
W indows pos (vl and dt)
Granbury Solutions
 
Maximizing csm
Maximizing csmMaximizing csm
Maximizing csm
Granbury Solutions
 

More from Granbury Solutions (20)

Gs Customer Conf 2014 Transitions
Gs Customer Conf 2014 TransitionsGs Customer Conf 2014 Transitions
Gs Customer Conf 2014 Transitions
 
Credit Card Processing Industry Response to the Increasingly Tech Savvy Customer
Credit Card Processing Industry Response to the Increasingly Tech Savvy CustomerCredit Card Processing Industry Response to the Increasingly Tech Savvy Customer
Credit Card Processing Industry Response to the Increasingly Tech Savvy Customer
 
The Science of Suggestion
The Science of SuggestionThe Science of Suggestion
The Science of Suggestion
 
Providing Secure and Reliable Public Internet
Providing Secure and Reliable Public InternetProviding Secure and Reliable Public Internet
Providing Secure and Reliable Public Internet
 
Continuous Innovations in Hospitality Tech
Continuous Innovations in Hospitality TechContinuous Innovations in Hospitality Tech
Continuous Innovations in Hospitality Tech
 
2014 Granbury Customer Conference Intro
2014 Granbury Customer Conference Intro2014 Granbury Customer Conference Intro
2014 Granbury Customer Conference Intro
 
Build your customer base webinar
Build your customer base webinarBuild your customer base webinar
Build your customer base webinar
 
Key Strategies to Build Your Wine Club Business
Key Strategies to Build Your Wine Club BusinessKey Strategies to Build Your Wine Club Business
Key Strategies to Build Your Wine Club Business
 
5 Ways to Beat the Big Guys
5 Ways to Beat the Big Guys5 Ways to Beat the Big Guys
5 Ways to Beat the Big Guys
 
Thr!ve beta intro customers
Thr!ve beta intro customersThr!ve beta intro customers
Thr!ve beta intro customers
 
Coffee Shop Manager Headquarters Module
Coffee Shop Manager Headquarters ModuleCoffee Shop Manager Headquarters Module
Coffee Shop Manager Headquarters Module
 
Proven ROI Case Studies for Restaurant Loyalty
Proven ROI Case Studies for Restaurant LoyaltyProven ROI Case Studies for Restaurant Loyalty
Proven ROI Case Studies for Restaurant Loyalty
 
Online ordering tips
Online ordering tipsOnline ordering tips
Online ordering tips
 
Pat Griswold: Essential Steps to increase sales
Pat Griswold: Essential Steps to increase salesPat Griswold: Essential Steps to increase sales
Pat Griswold: Essential Steps to increase sales
 
Grs customer conf pos focus group
Grs customer conf pos focus groupGrs customer conf pos focus group
Grs customer conf pos focus group
 
Grs customer conf 2013 transitions
Grs customer conf 2013 transitionsGrs customer conf 2013 transitions
Grs customer conf 2013 transitions
 
Loyalty best practices conf 2013
Loyalty best practices conf 2013Loyalty best practices conf 2013
Loyalty best practices conf 2013
 
N2 k
N2 kN2 k
N2 k
 
W indows pos (vl and dt)
W indows pos (vl and dt)W indows pos (vl and dt)
W indows pos (vl and dt)
 
Maximizing csm
Maximizing csmMaximizing csm
Maximizing csm
 

Recently uploaded

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 

Recently uploaded (20)

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 

Securing Remote Access

  • 1. The Threat is Real: Protecting Remote Access Notice of Confidentiality. This presentation is furnished to you solely in connection with your referral partner relationship with Mercury Payment Systems, LLC (“Mercury”). By accessing, use of, or receipt of this presentation, you agree and acknowledge that the information contained herein (the “Information”) is confidential and proprietary information of Mercury. You agree to keep the Information confidential and not to forward or otherwise disseminate or use the Information for any purpose other than in connection with your referral partner relationship with Mercury and subject to the confidentiality and other terms of the referral partner agreement between you and Mercury. You accept the Information presented herein “as is,” without any representation as to its accuracy or completeness.
  • 2. The Threat is Real Mercury Confidential and Proprietary - For Recipient's Internal Use Only 2 Improper use of remote access is contributing to the growing number of POS attacks on small merchants • Recent investigations by the card associations into retail merchant breaches indicate that attacks are being aimed at insecure remote access. • Small merchant breaches are a growing concern. • Weak passwords opened the door for the internal intrusion in 31% of compromises. • Brute force attacks on remote access are on the rise. According to Kaspersky Lab, there have been 1,000+ unique attempts each day since June 3, 2014. * * “A multi-headed battering ram: RDP Bruteforce attacks on the rise.” http://business.kaspersky.com/a-multiheaded-battering-ram-rdp-bruteforce-attacks-on-the-rise/
  • 3. How Does a Breach Happen? Once remote access vulnerabilities are attacked, malware is introduced and card numbers are stolen • Hackers use publicly available tools to locate businesses that use remote desktop applications. • Brute force attacks may use the login feature of the remote desktop solution, putting administrator accounts at risk. • Most applications involving card swipes at the POS leave the cardholder data unencrypted and readable in computer memory. • Intruders often disable anti-virus applications and establish additional back door connectivity through the installation of malware. • Malware is installed to collect full track data from the POS system. A common example of this malware is “Backoff.” Mercury Confidential and Proprietary - For Recipient's Internal Use Only
  • 4. A newly identified malware strain dubbed “Backoff” targets POS merchants and has been linked to numerous remote access attacks Backoff is a family of POS malware and typically consists of four capabilities: 1. Scraping memory for track data 2. Logging keystrokes 3. Command and control (C2) communication 4. Injecting malicious stub into explorer.exe Keylogging functionality is also present in most recent variants of Backoff. Mercury Confidential and Proprietary - For Recipient's Internal Use Only 4 Backoff POS Malware On July 31, 2014, an advisory was issued about “Backoff Point-of-Sale Malware” and can be found at the following website: https://www.us-cert.gov/ncas/alerts/TA14-212A
  • 5. Are You at Risk? If you answer “yes” to any of these questions, you are at risk Mercury Confidential and Proprietary - For Recipient's Internal Use Only 5 1. Do you use remote access to receive maintenance or service on your POS? 2. Can the POS be accessed for service 24/7 without you taking action to allow remote access? 3. Can the POS be accessed without your authorization?
  • 6. Managing Secure Remote Access Follow these eight steps to reduce your chances of a data breach 1. Limit the number of people who can access the system remotely. Only allow and provide remote access to those who have a strong business need, such as the POS system reseller for the remote service, co-owners, management and administrators. 2. Use complex passwords and two factor authentications for all access in the payment environment including POS accounts and remote access. Properly store authentication/security tokens and change passwords every 90 days. 3. Do not share remote access credentials. Ensure that each user with remote access has a unique username and password. Do not use the same password for a group or chain of merchants. Each merchant location needs a unique username and password. Mercury Confidential and Proprietary - For Recipient's Internal Use Only 6
  • 7. Managing Secure Remote Access 4. Disable remote access user accounts when no longer needed and disconnect sessions after a specific period of time. 5. Install and keep anti-virus, anti-spyware and firewalls up-to-date. Regularly run and review results of scans for malicious software. 6. Maintain up-to-date software, operating systems and web browsers at all times. Use the latest version of a remote management product or service. 7. Avoid leaving remote access software on and "listening" for incoming connections. Select a remote access package that requires a user at your merchant site to start or log on to initiate a remote access session when possible. 8. Reboot POS systems daily to clear volatile memory, and consider using a secure file wiping utility that can securely clear the contents of the page (swap) file. Mercury Confidential and Proprietary - For Recipient's Internal Use Only