Fraud and Security Fraud and Security

Security Threats

Back to Security Threats
SECURITY THREAT

Merchants: PoSeidon malware targets point-of-sale systems

A new Trojan virus program is targeting point-of-sale (PoS) terminals to steal credit card data. The payment card-stealing malware, "PoSeidon," is designed to steal credentials specifically for the widely used LogMeIn application.

Once it gains access, the program deletes any encrypted or saved passwords and profiles, forcing the user to re-enter their password and username credentials to gain access to the system. When this happens, the malware captures all the information needed to access your account.

More information about PoSeidon is available in this CSO article. Pinnacle encourages you to seek out trusted IT providers and partners that can give you effective advice to evaluate and "harden" your systems against cyber crime.

This is a good reminder that owners and operators of PoS systems should also follow some best practices to increase security and prevent unauthorized access:

  • Use Strong Passwords: It is highly recommended that business owners change passwords to their PoS systems on a regular basis, using unique account names and complex passwords.
  • Update POS Software Applications: Ensure that PoS software applications are using the latest updated software applications and software application patches to remain PCI 3.0 compliant. PoS systems, in the same way as computers, are vulnerable to malware attacks when required updates are not downloaded and installed on a timely basis.
  • Don't Run Extra Applications: Third-party applications like Oracle Java or Adobe's Flash or Reader software etc. are frequent targets of criminal hacking. Avoid installing additional software not required to run your PoS application terminal.
  • Install a Firewall: A firewall can prevent unauthorized access to, or from, a private network by screening out traffic from hackers, viruses, worms or other types of malware specifically designed to compromise a PoS system.
  • Use Antivirus: Antivirus programs work to recognize software that fits its current definition of being malicious and attempts to restrict that malware's access to the systems. It is important to continually update the antivirus programs for them to be effective on a PoS network.
  • Restrict Access to Internet: PoS systems should only be used online to conduct PoS-related activities and not for general Internet or email use.
  • Disallow Remote Access: To prevent unauthorized access, it is important to disallow remote access to the PoS network at all times.

Protecting your Privacy

Federal law gives consumers the right to limit some of how your personal information is shared. See how Pinnacle protects your personal data.

Stop Email Fraud

Pinnacle developed a list of the Super Six questions you can ask yourself to help determine the legitimacy of any email.

Trusteer Rapport

Trusteer Rapport will not be supported in Tennessee after Dec. 31, 2018. Instructions for uninstalling the software are available here.