During the Christmas holidays, families across America were anxiously awaiting the day of merriment and joy when they could rip open their presents, spend time with family, and watch football on the couch while recovering from a feast fit for a king. Computer hackers were looking forward to the holidays as well. They were busy creating a little piece of code called “Dexter” that is capable of stealing data from point-of-sale (POS) systems, and it has been stealing credit cards this holiday season.
While Dexter is not the first custom created code designed to attack POS systems directly, it has been one of the most successful ones in recent history with potentially 200-300 retailers (no telling how many individual locations this includes) affected by it, according to an article published by Dark Reading last month. The article credits the security firm Seculert for first detecting and publishing information about Dexter on its website. A link to their findings can be found here.
So is this just an interesting technological achievement that has no real impact on retailers, or is it something that you should be concerned about if you run a POS system? Well, as someone who spends almost all his time helping people manage and maintain good security I would suggest that this threat should be treated as a real issue. I am not alone either. Credit card processor, First Data, and credit card company, Visa, agree with me on this one as well.
On December 24th, First Data issued a warning to several merchants about Dexter claiming that Visa has received several reports of POS systems being compromised by the malware. The good thing about this notification is that it not only describes the problem, but it includes steps a merchant can take to see if they have been compromised. The warning includes the following URLs and IP addresses that should alert you that your system might have been compromised (we have identified potentially 2 more IP addresses and we are including those below as well):
220.127.116.11 (added by VendorSafe)
18.104.22.168 (added by VendorSafe)
If any of your systems are sending data to these addresses, you should be concerned. At the very least, if you are reading this posting, and you do not know how to determine if you have been compromised, seek professional guidance. Your anti-virus software will probably not be an effective tool against this particular malware because it will take time for the virus signatures to be updated to detect it. This is not something that you should ignore. If you do not feel up to the task of detecting the presence of the malware yourself, contact your IT resource to assist you, or engage with a firm that can.
Bradley K. Cyprus has more than 20 years experience in the security industry. He manages the development of in-house solutions to validate compliance, and he is a resource that Vendor Safe customers can rely upon to help interpret the PCI standard.