DATA DOCTORS

Why are so many big-name retail chains being hacked?

Oct 23, 2014, 4:27 AM | Updated: 4:27 am

While it may seem like it’s all of the sudden, retail chains have long been preferred victims for hackers, primarily because they can gather huge swaths of personal information if they are successful.

In the past, a company’s large storage servers and internal systems were the targets. That’s what’s changed and led to the increase in high-profile retail hacks.

Sophisticated criminal groups have created and widely distributed malware that can infect the cash registers or PoS (Point of Sale) terminals used by just about all retail businesses.

If they can gain access, they are able to plant something called a RAM scraper that captures credit card and debit card information that is stored on the magnetic stripe on the back of credit cards.

Capturing the “mag swipe” data allows the thieves to create bogus cards that include additional security information not available if they just got the credit card number.

This makes what they steal much more valuable on the black market, especially when they can grab tens of millions of cards before the exploit is discovered.

The Department of Homeland Security has posted several advisories for the “BackOff” PoS malware that is responsible for most of the hacks you’re hearing about.

They estimated that over 1,000 businesses were likely infected and most were probably unaware that they are infected because it was easily evading most antivirus detection methods.

Most major antivirus companies have added BackOff malware detection capabilities to their systems, but it’s very likely that the hackers will continue to alter their code to continue the cat-and mouse-game with antivirus programs.

What should be of particular interest to everyone, not just large scale retailers, is how they are gaining access to these protected systems.

The Secret Service has confirmed that the majority of breaches is occurring through commonly-used tools that allow for remote access.

Popular remote access tools from Microsoft, Apple, Google and LogMeIn are being exploited through “brute force” attacks (massive, high-speed, password-guessing attacks), which means that ANYONE using these tools for ANY purpose could be victimized.

Remote access tools are extremely productive both personally and professionally, so if you’re using them, here are some tips for reducing your exposure to these aggressive attackers:

• Turn off remote access systems that aren’t absolutely necessary.
• Increase password length to at least 15 characters or more to make brute force attacks too time-consuming.
• Turn on intrusion detection and two-factor authentication when available.
• Use non-standard port settings to bypass known defaults.
• Use antivirus that has a live protection service to stay protected from new threats.
• Don’t ignore systems that have noticeably slowed down. This is often an indication of infection.
• For high-security situations, consider replacing remote access with a VPN (Virtual Private Network). Businesses should rely on their IT departments or IT vendors to makes sure these technical issues have been reviewed.

If you’re a home user looking to improve security, here are 10 additional tips for fighting hackers at home.

Data Doctors

Patrick Mahomes #15 and head coach Andy Reid of the Kansas City Chiefs are recorded on a phone as t...

Data Doctors

Handy tech tips all Valley residents should use to find lost phones in a snap

Q: My phone went missing, and I haven’t been able to locate it using the Find My service, so what should I do next?

6 days ago

(Pexels Photo)...

Ken Colburn, Data Doctors

Here are tips for freeing up Google storage space

Google provides a generous amount of free online storage but it can fill up quickly depending on how many of its resources you use.

13 days ago

Discover how to assess, estimate, and shop for the right battery pack with this concise guide. (Pex...

Data Doctors

Here is everything you need to know for testing and buying battery banks

Discover how to assess, estimate and shop for the right battery pack with this concise guide.

20 days ago

(Pexels Photo)...

Ken Colburn, Data Doctors

Here are the truly free smartphone video editing apps

The processing power on our smartphones has grown exponentially, allowing anyone to perform sophisticated video editing easily.

27 days ago

Google Maps app....

Data Doctors

How to rediscover places visited years ago on Google maps

Whether you're an Android or iOS user, or prefer accessing Google Maps on your computer, you'll find step-by-step instructions to unlock your travel memories effortlessly.

1 month ago

(Photo by Michael Bocchieri/Getty Images)...

Ken Colburn, Data Doctors

Here’s how to calculate your bandwidth needs

When searching for an alternative internet service provider, here are some tips on how to know how much bandwidth is needed.

1 month ago

Sponsored Articles

...

COLLINS COMFORT MASTERS

Here are 5 things Arizona residents need to know about their HVAC system

It's warming back up in the Valley, which means it's time to think about your air conditioning system's preparedness for summer.

...

Midwestern University

Midwestern University Clinics: transforming health care in the valley

Midwestern University, long a fixture of comprehensive health care education in the West Valley, is also a recognized leader in community health care.

...

Collins Comfort Masters

Here’s 1 way to ensure your family is drinking safe water

Water is maybe one of the most important resources in our lives, and especially if you have kids, you want them to have access to safe water.

Why are so many big-name retail chains being hacked?