Original Release Date: 7/27/2015
TLP: WHITE
Point-of-Sale (PoS) malware breaches attracted wide media coverage throughout 2014 when at least thirteen major U.S. retailers suffered payment card data breaches, the largest affecting approximately 110 million customers. Although PoS incidents have largely remained out of the headlines thus far in 2015, payment card breaches have continued month to month and many new variations of PoS malware have been identified by law enforcement and security researchers. The NJCCIC assesses data breaches resulting from PoS malware will continue to occur at a steady pace throughout 2015 and pose a persistent threat to public and private sector organizations, particularly small to mid-size businesses that lack the cybersecurity resources to prevent, detect, and mitigate these threats. The industries most targeted by PoS malware include retail, food services, healthcare, education, and tourism. While the ongoing implementation of the more-secure Europay, MasterCard, & Visa (EMV) cards, also known as chip-and-PIN, is expected to mitigate PoS vulnerabilities and reduce fraud in the U.S., many retailers and cardholders will remain vulnerable until all EMV cards are issued and PoS terminals throughout the country are updated to accept EMV transactions.
PoS malware is malicious software designed to steal credit and debit card data from retail payment processing systems. Since 2013, there has been a dramatic rise in the number of PoS malware variants, and the tools and knowledge to conduct these attacks are becoming more widely available through online criminal forums. Ready-to-use PoS malware kits and the widely reported success of previous attacks have made PoS systems an attractive target and lucrative undertaking for criminals across the globe. Additionally, the ‘swipe-and-sign’ process used to complete transactions has been in place since the 1970s and is inherently insecure.
Traffic Light Protocol: WHITE information may be distributed without restriction.