

“There was also
a lack of network segmentation between the Cardholder Data Environment (CDE) and corporate network,
which enabled lateral movement. Once the POS environment was successfully accessed, a Random Access
Memory (RAM) scraper was deployed on the POS system to harvest payment card data,” Visa explains.
The second attack method involves similar steps, except Via is not sure how the actors obtained network access to the targeted merchant. Once inside, however, they again move laterally into the POS system to pilfer credit card data.
“It is important to note that this attack vector differs significantly from skimming at fuel pumps, as the
targeting of POS systems requires the threat actors to access the merchant’s internal network, and takes
more technical prowess than skimming attacks,” Visa says.
The good news is, these attacks do not seem to compromise newer credit and debit cards that have security chips on them. However, there are still lots of older credit cards in the wild, so gas station merchants would be wise to heed Visa’s advise.
‘).insertAfter(jQuery(‘#initdisqus’));
}
loadDisqus(jQuery(‘#initdisqus’), disqus_identifier, url);
}
else {
setTimeout(function () { disqusDefer(); }, 50);
}
}
disqusDefer();
function loadDisqus(source, identifier, url) {
if (jQuery(“#disqus_thread”).length) {
jQuery(“#disqus_thread”).remove();
}
jQuery(‘
‘).insertAfter(source);
if (window.DISQUS) {
DISQUS.reset({
reload: true,
config: function () {
this.page.identifier = identifier;
this.page.url = url;
}
});
} else {
//insert a wrapper in HTML after the relevant “show comments” link
disqus_identifier = identifier; //set the identifier argument
disqus_url = url; //set the permalink argument
//append the Disqus embed script to HTML
var dsq = document.createElement(‘script’); dsq.type = ‘text/javascript’; dsq.async = true;
dsq.src = ‘https://’ + disqus_shortname + ‘.disqus.com/embed.js’;
jQuery(‘head’).append(dsq);
}
jQuery(‘.show-disqus’).show();
source.hide();
};
function disqusEvent()
{
idleTime = 0;
}
