A Journey to Protect Points of Sale (POS)

81
$ -RXUQH\ 7R 3URWHFW 3RLQWV 2I 6DOH Nir Valtman, CISSP : ZZZYDOWPDQRUJ #9DOWPD1LU

description

A Journey to Protect Points of Sale.

Transcript of A Journey to Protect Points of Sale (POS)

Page 1: A Journey to Protect Points of Sale (POS)

$�-RXUQH\�7R�3URWHFW�3RLQWV�2I�6DOH

Nir Valtman, CISSP: ��ZZZ�YDOWPDQ�RUJ�� ��#9DOWPD1LU

Page 2: A Journey to Protect Points of Sale (POS)

Introduction

�3KRWR�E\�%LOO�)UDVHU

Page 3: A Journey to Protect Points of Sale (POS)

���������� �

Page 4: A Journey to Protect Points of Sale (POS)

���������� �

,¶P�DQ�DUFKLWHFW

Page 5: A Journey to Protect Points of Sale (POS)

Page 6: A Journey to Protect Points of Sale (POS)

���������� �

Page 7: A Journey to Protect Points of Sale (POS)

Zombies!!!

Page 8: A Journey to Protect Points of Sale (POS)

Defacement

Page 9: A Journey to Protect Points of Sale (POS)

AntiDef

OPEN SOURCE

Memory ScraperSecure TDD

Page 10: A Journey to Protect Points of Sale (POS)

��

Page 11: A Journey to Protect Points of Sale (POS)

Why Points Of Sale Targeted?

��

Page 12: A Journey to Protect Points of Sale (POS)

��

Page 13: A Journey to Protect Points of Sale (POS)

��

Page 14: A Journey to Protect Points of Sale (POS)

Deployment

��

Page 15: A Journey to Protect Points of Sale (POS)

��

Page 16: A Journey to Protect Points of Sale (POS)

��

Page 17: A Journey to Protect Points of Sale (POS)

��

Page 18: A Journey to Protect Points of Sale (POS)

��

Page 19: A Journey to Protect Points of Sale (POS)

Payment ApplicationPoint Of Sale

IS NOTV

Page 20: A Journey to Protect Points of Sale (POS)

��

RAMDB

POS Payment Processing

Host

PA Server

Store Payment  Processor’s  Data Center

PA Client

RAM

DB

Page 21: A Journey to Protect Points of Sale (POS)

RAMDB

POS Payment Processing

Host

PA Server

Store Payment  Processor’s  Data Center

PA Client

RAM

DB

5HVW 7UDQVLW 0HPRU\

:KHUH�$UH�0\�&UHGLW�&DUGV"

Page 22: A Journey to Protect Points of Sale (POS)

Mobile App Presentation Server Application & Payment Server Payment  Processor’s  Data  Center

5HVW 7UDQVLW 0HPRU\

:KHUH�$UH�0\�&UHGLW�&DUGV"

Page 23: A Journey to Protect Points of Sale (POS)
Page 24: A Journey to Protect Points of Sale (POS)

Mobile App Presentation Server Application & Payment Server Payment  Processor’s  Data  Center

Token

Server

&UHGLW�&DUGV

Page 25: A Journey to Protect Points of Sale (POS)

Retail

Environment

Assumptions

100% PCI Compliant

Page 26: A Journey to Protect Points of Sale (POS)

Retail

Environment

Assumptions

Page 27: A Journey to Protect Points of Sale (POS)

Retail

Environment

Assumptions

Page 28: A Journey to Protect Points of Sale (POS)

Retail

Environment

Assumptions

Notvulnerable

Page 29: A Journey to Protect Points of Sale (POS)

Retail

Environment

Assumptions

Page 30: A Journey to Protect Points of Sale (POS)

Retail

Environment

Assumptions

Cashier ≠ hacker

Page 31: A Journey to Protect Points of Sale (POS)

Retail

Environment

Assumptions

Big Brother

Page 32: A Journey to Protect Points of Sale (POS)

RATs

Page 33: A Journey to Protect Points of Sale (POS)

RemoteAdministrationTools

Page 34: A Journey to Protect Points of Sale (POS)

Routing

Page 35: A Journey to Protect Points of Sale (POS)
Page 36: A Journey to Protect Points of Sale (POS)

Threats

��

Page 37: A Journey to Protect Points of Sale (POS)

��

5($':5,7(

Page 38: A Journey to Protect Points of Sale (POS)

��

,�$0�%2%

0(�722

Page 39: A Journey to Protect Points of Sale (POS)

3D\PHQW�6WDJHV�� $XWKRUL]DWLRQ

��

PA

Processor

IssuerGateway

Acquirer

Route Track1/2 Transmit Track1/2

POI

Transmit Track1/2

'LIILFXOW([SORLWDWLRQ

Page 40: A Journey to Protect Points of Sale (POS)

3D\PHQW�6WDJHV�� $XWKRUL]DWLRQ

��

Page 41: A Journey to Protect Points of Sale (POS)

3D\PHQW�6WDJHV�� 6HWWOHPHQW

��Processor

IssuerGateway

Acquirer

Transmit SettlementStore & Send PANs

PA Server

Credit  Merchant’s  Account

'LIILFXOW([SORLWDWLRQ

Page 42: A Journey to Protect Points of Sale (POS)

3D\PHQW�6WDJHV�� 6HWWOHPHQW

��

Page 43: A Journey to Protect Points of Sale (POS)

��

0HPRU\�6FUDSLQJ

'HPR

Page 44: A Journey to Protect Points of Sale (POS)

��

Page 45: A Journey to Protect Points of Sale (POS)

��

Page 46: A Journey to Protect Points of Sale (POS)

��

Page 47: A Journey to Protect Points of Sale (POS)

OfflineOnline VS

Page 48: A Journey to Protect Points of Sale (POS)

Bypassed Solutions

��

Page 49: A Journey to Protect Points of Sale (POS)

��

SecureString Class

Demo

Page 50: A Journey to Protect Points of Sale (POS)

��

1H[W 1H[W1H[W1H[W 1H[W�*HQHUDWLRQ )LUHZDOO

Page 51: A Journey to Protect Points of Sale (POS)

��

ANTI

Page 52: A Journey to Protect Points of Sale (POS)

��

Page 53: A Journey to Protect Points of Sale (POS)

��

:KLWHOLVW

0'� 6+$���

Page 54: A Journey to Protect Points of Sale (POS)

Correct Solutions

��

Page 55: A Journey to Protect Points of Sale (POS)

��

Cyber Intelligence

Page 56: A Journey to Protect Points of Sale (POS)

��

,�KDYH�DFFHVV�WR�326�WHUPLQDOV�LQ�WKH�86��ZKDW�LV�WKH�EHVW�PDOZDUH�,�VKRXOG�XVH"

Page 57: A Journey to Protect Points of Sale (POS)

��

<RX�QHHG�WR�LQIHFW�WKH�ILUPZDUH�RI�WKH�WHUPLQDO��%\�GRLQJ�WKDW��\RX�FDQ�JHW�IXOO�WUDFN��������

EXW�WKH�3,1�ZLOO�EH�KDVKHG�

Page 58: A Journey to Protect Points of Sale (POS)

��

6HOOLQJ�PDOLFLRXV�ILUPZDUH�IRU�9HULIRQH¶V 326�WHUPLQDOV�/HDNV�GXPSV���3,1V�WKURXJK�*356��

3ULFH��2QO\�����

Page 59: A Journey to Protect Points of Sale (POS)

��

%XVLQHVV�'HYHORSPHQW�2IIHU2ZQHU�RI�D�IDNH�326�VHOOV�KLV�WHUPLQDO�

3ULFH������IURP�UHYHQXH�VKDULQJ�

Page 60: A Journey to Protect Points of Sale (POS)

��

5),��&KDQJH�WHUPLQDO�FRQILJXUDWLRQ�WR�UHTXLUH�3,1�IRU�DOO�FDUGV�&DXVH��*HW�RQO\�����GDWD��EXW�ZDQWV�3,1V

3URSRVHG�6ROXWLRQ��7KHUPDO�,PDJHU

Page 61: A Journey to Protect Points of Sale (POS)

��

Sandbox

Page 62: A Journey to Protect Points of Sale (POS)

��

Network-basedAnomaly Detection

Page 63: A Journey to Protect Points of Sale (POS)

��

Operating SystemAnomaly Detection

Page 64: A Journey to Protect Points of Sale (POS)

��

Runtime Obfuscation

Page 65: A Journey to Protect Points of Sale (POS)

Not only products required

��

Page 66: A Journey to Protect Points of Sale (POS)

��

Page 67: A Journey to Protect Points of Sale (POS)

��

3HUIRUPDQFH� 6HFXULW\

Page 68: A Journey to Protect Points of Sale (POS)

��

Assembly Signing

Page 69: A Journey to Protect Points of Sale (POS)

��

Assembly Obfuscation

Page 70: A Journey to Protect Points of Sale (POS)

PROCESS ISOLATION

Page 71: A Journey to Protect Points of Sale (POS)

What Next

��

?

? ?

?

??

?

?

??

??

? ?

?

Page 72: A Journey to Protect Points of Sale (POS)

:KDW�:RXOG�<RX�6WHDO"

%,3�%,3

Page 73: A Journey to Protect Points of Sale (POS)

��

0HPRU\6FUDSLQJ

Page 74: A Journey to Protect Points of Sale (POS)

��

0HPRU\6FUDSLQJ

Cashier = hacker

Page 75: A Journey to Protect Points of Sale (POS)

��

0HPRU\6FUDSLQJ

Page 76: A Journey to Protect Points of Sale (POS)

Summary

��

Page 77: A Journey to Protect Points of Sale (POS)

��

0HPRU\6FUDSLQJ

6HFXULW\�E\�2EVFXULW\

Page 78: A Journey to Protect Points of Sale (POS)

��

0HPRU\6FUDSLQJ

6LPSOH�([SORLWDWLRQ�

Page 79: A Journey to Protect Points of Sale (POS)

��

0HPRU\6FUDSLQJ

+DUG�WR�3URWHFW

Page 80: A Journey to Protect Points of Sale (POS)

��

0HPRU\6FUDSLQJ

<RX¶UH�,QVXUHG

Page 81: A Journey to Protect Points of Sale (POS)

Nir Valtman: ��ZZZ�YDOWPDQ�RUJ�� ��#9DOWPD1LU