Following the news about Hutton Hotel Breach, Brian Laing, VP Products and Business Development at Lastline commented below.
Brian Laing, VP Products and Business Development at Lastline:
“It is hard to tell the specifics afflicting the Nashville Hutton Hotel, but the Hotel disclosure did state, ‘Findings from the investigation show that unknown individuals were able to install a program on the payment processing system at the Hutton Hotel designed to capture payment card data as it was routed through the system.’ This is a statement of presence of malware.
“Point of Sale (POS) systems tend to rely on older operating systems, nearly all Microsoft Windows. Interestingly, it is very common to find Windows XP in current distribution for POS systems even today.
“Though there are a plethora of exploits for Windows XP given its age in service. Lastline has well documented many a POS-specific exploits, including the topical and ever proliferating ModPOS, as one example which really only needs a 32-bit Windows system to work and acts as a “framework” for the criminal. That is to say, the criminal can use it as a place to “plug in” a set of “services” to run any number of activities in the host environment including gathering more machines in its grasp, gathering personal payment information etc. Since ModPOS works at the kernel level, or at a very low level in the computing stack, most security scanning systems will miss its presence. Many times these hacks are discovered by customers reporting false charges or stolen identities en masse, rather than the security department of the organization detecting and blocking the malware. It is impossible to say without the benefit of the the private security report from the Hotel itself, whether the exploit of the Hutton was, in fact, ModPOS.”
Most Commented Posts
2020 Cybersecurity Landscape: 100+ Experts’ Predictions
Cyber Security Predictions 2021: Experts’ Responses
Experts’ Responses: Cyber Security Predictions 2023
Celebrating Data Privacy Day – 28th January 2023
Data Privacy Protection Day (Thursday 28th) – Experts Comments
Most Active Commenters
Recent Comments
Chat systems such as Slack and Teams need to be…
“This is a sophisticated phishing scam that will catch out…
“Cybersecurity is increasingly complex, in part, due to the interconnected…
“Unfortunately, time and time again we see NGOs, hospitals and…
As I have always said - it is verified trust…