Saturday, November 23, 2024
Advertisement
  1. You Are At:
  2. News
  3. Business
  4. Post demonetisation, micro-ATMs, Point of Sale vulnerable to cyber attacks

Post demonetisation, micro-ATMs, Point of Sale vulnerable to cyber attacks

As micro-ATMs and POS counters registered a sharp surge in usage post demonetisation, customers, bankers and traders have been cautioned against skimming and malware attacks on these systems. CERT-In, country's premier cyber security agency, has

India TV Business Desk New Delhi Published on: December 04, 2016 17:07 IST
Micro-ATMs, Point of Sale vulnerable to cyber attacks.
Micro-ATMs, Point of Sale vulnerable to cyber attacks.

As micro-ATMs and POS counters registered a sharp surge in usage post demonetisation, customers, bankers and traders have been cautioned against skimming and malware attacks on these systems.

CERT-In, country's premier cyber security agency, has asked them to adopt high-end encryption to plug possible breaches.

The CERT-In, nodal agency to combat hacking, phishing attacks and to fortify security-related defences of the Indian Internet domain, has issued two specific advisories for micro-Automated Teller Machines (ATMs) and Point of Sale (POS) terminals.

The advisory states that as micro-ATMs work with minimal power and connect to central banking servers through a GPRS network, their security features need to be strong and updated to check attempts by hackers who stealthily plan to steal private customer and bank data which leads to loss of their hard earned money by way of hacking or electronic stealing.

"Traditionally, data input into the POS system is in memory in clear text which allows attackers, memory scrapers to be very successful.

"The way to minimise this risk is by encrypting the card data as soon as possible and keeping it encrypted to the maximum extent throughout its life within the system. Point to Point Encryption (P2PE) could be used to address the issue of encrypting data in memory," the advisory, accessed by PTI, said.

It explains that skimming is the theft of classified credit/debit card data.

"A thief can obtain the victim's credit card number using a small electronic device near the card acceptance slot and store hundreds of victims' credit card numbers," it said.

A social engineering attack can be engineered at these facilities, it added, by gaining trust of the owner as the fraudster poses as a member of staff.

"The fraudster would then ask the customer to check the card for damages. The fraudster would have gained confidence from his prey using various tactics such as offering assistance to the customer who perhaps would have tried to use the ATM without success or perhaps the customer who is not familiar with use of micro ATM machine and requires assistance," it said.

A micro ATM enables the un-banked rural population to access banking services in their villages or towns in a convenient manner and it offers facilities of deposit, withdrawal, funds transfer, balance enquiry and issuance of mini-statement.

The agency has asked the banks and micro ATM operators to exercise some counter-measures to thwart such attacks.

"The micro ATM must not transmit any confidential data unencrypted on the network; it must automatically log out the operator and lock itself after a period of inactivity; keep all the micro ATM software, application, anti-virus regularly updated and educate the customer about basic functionalities and security best practises," the advisory by Computer Emergency Response Team-India (CERT-In) said.

It also suggested customers to render due diligence of securing their PIN and not sharing vital details with strangers.

With regard to POS systems, the place where a retail transaction occurs and the merchant charges payment from the customer via a debit/credit card, the agency has alerted users against the use of skimmer device "that scans a customer's card and stores the information contained in the magnetic strip" and hacks into it to defraud.

The advisory specifically talks against the destructive activity of a virus called 'POS malware', a type of malicious software, that is "used by cyber criminals to target POS terminals with the intent to obtaining credit/debit card information by reading the device memory from the retail checkout point of sale system."

The CERT-In advisory recommended deployment of strong and effective anti-virus and firewalls and restricting of access to the internet system of the POS terminal.

"All POS devices owners should change passwords of their POS systems on a regular basis, using unique account names and complex passwords; should ensure that all their Wi-Fi and internet connections are secured; merchants may modulate the signal strength of their Wi-Fi network so that it does not extend too far from the area of use or shop and ensuring that no electronic/magnetic devices are attached with POS systems" are some of the combat measures suggested by the agency for traders.

 

(With PTI inputs)

Advertisement

Read all the Breaking News Live on indiatvnews.com and Get Latest English News & Updates from Business

Advertisement
Advertisement
Advertisement
Advertisement
X