No Visibility Of Point Of Sale Vulnerabilities Was Responsible For Trump Hotel Breach – Chuck Leaver

Written By Matthew Fullard Presented By Chuck Leaver CEO Ziften


Trump Hotels Point-of-Sale Susceptibility Emphasize Need for Faster Detection of Anomalous Activity


Trump Hotels, suffered a data breach, between May 19th 2014 and June 2, 2015. The point of infection utilized was malware, and infected their front desk computer systems, POS systems, and restaurants. However, in their own words they declare that they “did not discover any proof that any customer information was removed from our systems.” While it’s soothing to find out that no evidence was discovered, if malware exists on POS systems it is most likely there to steal details related to the credit cards that are swiped, or progressively tapped, placed, or waved. An absence of proof does not suggest the absence of crime, and to Trump Hotel’s credit, they have actually offered totally free credit tracking services. If one is to take a look at a Point-of-Sale (or POS) system however you’ll discover one thing in abundance as an administrator: They hardly ever change, and software will be nearly homogeneous throughout the deployment community. This can present both positives and negatives when thinking about securing such an environment. Software changes are slow to happen, need strenuous screening, and are hard to roll out.

Nevertheless, due to the fact that such an environment is so uniform, it is also much easier to determine Point of Sale vulnerabilities and when something brand-new has actually changed.

At Ziften we monitor all executing binaries and network connections that take place within a community the second they occur. If a single POS system started to make brand-new network connections, or started running brand-new software, despite its intent, it would be flagged for additional evaluation and assessment. Ziften also gathers limitless historical data from your environment. If you need to know what took place six to twelve months earlier, this is not an issue. Now dwell times and AV detection rates can be measured using our integrated threat feeds, as well as our binary collection and submission technology. Likewise, we’ll tell you which users initiated which applications at what time throughout this historical record, so you can learn your preliminary point of infection.

POS problems continue to plague the retail and hospitality industries, which is a pity given the fairly uncomplicated environment to monitor with detection and response.

Leave a Reply

Your email address will not be published. Required fields are marked *