SlideShare a Scribd company logo
Backoff My Point-of-Sale Data! 
Profiling the Backoff PoS Malware Affecting Retailers 
Engin Kirda 
Ph.D., Co-Founder & Chief Architect, Lastline 
www.lastline.com
What is Backoff? 
• Malware used in numerous breaches in the last year 
• Secret Service currently estimates 1,000+ U.S. businesses affected 
• Targeted to PoS systems 
• Evades analysis 
Copyright ©2014 Lastline, Inc. All rights reserved. 2
Recent and Notable Retail/Payments Breaches 
• The last year has seen a dramatic escalation in the number of 
breached PoS systems 
• Many of these PoS payloads, like Backoff, evaded installed 
defenses and alarms 
Copyright ©2014 Lastline, Inc. All rights reserved. 3
What is Backoff? 
[1 Slide Summary from Kyle] 
• Product screenshot? 
• Mention evasive behaviors exhibited 
Copyright ©2014 Lastline, Inc. All rights reserved. 4
What is Backoff? 
• Timing evasion (an anti-VM technique) 
• Utilizes code obfuscation 
• Also uses rare and poorly emulated instructions to defeat simple 
emulators 
• Attempts to encrypt parts of the command and control traffic 
Copyright ©2014 Lastline, Inc. All rights reserved. 5
How are the attackers deploying it? 
• Scan for Internet facing Remote Desktop applications 
• Brute force login credentials 
• Often successfully find administrative credentials 
• Use admin credentials to deploy Backoff to remote PoS systems 
Copyright ©2014 Lastline, Inc. All rights reserved. 6
Understanding Evasive Malware 
Malware authors are not stupid 
• they got the news that sandboxes are all the rage now 
• since the code is executed, malware authors have options 
Evasion defined 
• Develop code that exhibits no malicious behavior in a traditional 
sandbox, but still infects the intended target 
• Can be achieved in a variety of ways… 
Copyright ©2014 Lastline, Inc. All rights reserved. 7
8 
The Evasive Malware Problem 
Current solutions fail to protect organizations from sophisticated, targeted attacks. 
Copyright ©2014 Lastline, Inc. All rights reserved.
Lastline Labs AV Vendor Review 
Antivirus systems take months to catch up to highly evasive threats. 
Copyright ©2014 Lastline, Inc. All rights reserved. 9
3 Ways to Build a Sandbox 
Not all sandbox solutions can detect highly evasive malware. 
Copyright ©2014 Lastline, Inc. All rights reserved. 10
Virtualized Sandboxing vs. Full System Emulation 
Even APT Solutions with virtualized sandboxing fail to detect highly evasive malware. 
Copyright ©2014 Lastline, Inc. All rights reserved. 11
Securing Your Organization 
• At PoS: Accept EMV payments to limit exposure in case of a breach 
• At PoS: E2E encryption of transaction (POI never has cleartext) 
• Detect and protect against malware and C&C 
• Full system emulation approach with Lastline 
Copyright ©2014 Lastline, Inc. All rights reserved. 12
Detect Evasive Malware in Your Network 
Start your 30-day Lastline trial: http://landing.lastline.com/request-lastline-trial 
“I would highly recommend 
Lastline to any company that 
is entrusted with customer 
data. Retailers, restaurants, 
or any organization that is 
interested in elevating their 
handling and protection of 
data could benefit from 
working with Lastline.” 
Tom Lindblom 
CTO, CKE Restaurants 
Copyright ©2014 Lastline, Inc. All rights reserved. 13
Thank You! 
For more information visit www.lastline.com 
or contact us at info@lastline.com.

More Related Content

PPTX
Introducing Savvius Vigil
PPTX
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
PPTX
T3 conference talk nov 2014
PPTX
Time Traveling: Adapting Techniques from the Future to Improve Reliability, J...
PPTX
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
PDF
AWS Summit Singapore 2019 | Pragmatic Container Security
PPT
Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...
PPTX
Risks vs real life
Introducing Savvius Vigil
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
T3 conference talk nov 2014
Time Traveling: Adapting Techniques from the Future to Improve Reliability, J...
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
AWS Summit Singapore 2019 | Pragmatic Container Security
Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...
Risks vs real life

What's hot (20)

PPTX
Endpoint Security Evasion
PDF
Web Intrusion Detection
PPTX
Advanced Persistent Threats
PPTX
Firewall, Router and Switch Configuration Review
PPT
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
PPTX
Security Ops for large and small companies
PDF
On the impact of security vulnerabilities in the npm package dependency network
PPTX
ESET: Delivering Benefits to Enterprises
PDF
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...
PPTX
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
PDF
The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014
PDF
The Internet of Insecure Things: 10 Most Wanted List
PDF
Newsletter Connect - Sep 2015
PDF
Build and deploy bulletproof software
PPTX
Network Forensics for Splunk, an Emulex presentation
PDF
Virtual Security
PDF
Positive Hack Days 7 - Ransomware forensiсs
PPTX
Multi domain security-management_technical_presentation
PDF
Protection Service for Business
PPTX
Application Security within Agile
Endpoint Security Evasion
Web Intrusion Detection
Advanced Persistent Threats
Firewall, Router and Switch Configuration Review
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
Security Ops for large and small companies
On the impact of security vulnerabilities in the npm package dependency network
ESET: Delivering Benefits to Enterprises
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014
The Internet of Insecure Things: 10 Most Wanted List
Newsletter Connect - Sep 2015
Build and deploy bulletproof software
Network Forensics for Splunk, an Emulex presentation
Virtual Security
Positive Hack Days 7 - Ransomware forensiсs
Multi domain security-management_technical_presentation
Protection Service for Business
Application Security within Agile
Ad

Viewers also liked (20)

PPTX
4 ltr powerpoint2010_ch21_pr1a_briannaspinney_2
PDF
Realmadrid-Atleticodemadrid
PDF
KCB101 Not Your Mothers' Storyboard
PDF
Vaccination Schedules for Dogs and Puppies
PPTX
Siklus anggaran forum skpd
PDF
FC Barcelona, trayectoria de sus estadios
PPTX
Three things for wildcard ssl certs
PDF
Liptonvscold final
PDF
White stone meandr
PPTX
PERBANDINGAN EVALUASI KEKUATAN PERLEKATAN MICRO-TENSILE PADA SISTEM ADHESIF O...
PPTX
Tech slide show
PPT
(Lovern tamra historyingraphicdesign)powerpoint
PPTX
Sophia grant 3100849 lang6099 power point presentationl
PDF
Snoring
PPTX
Ashley
PPT
PPTX
Blenderman by panda_apps_presentation
PPTX
Prezentacja1
PDF
Real Madrid, trayectoria de su estadio
4 ltr powerpoint2010_ch21_pr1a_briannaspinney_2
Realmadrid-Atleticodemadrid
KCB101 Not Your Mothers' Storyboard
Vaccination Schedules for Dogs and Puppies
Siklus anggaran forum skpd
FC Barcelona, trayectoria de sus estadios
Three things for wildcard ssl certs
Liptonvscold final
White stone meandr
PERBANDINGAN EVALUASI KEKUATAN PERLEKATAN MICRO-TENSILE PADA SISTEM ADHESIF O...
Tech slide show
(Lovern tamra historyingraphicdesign)powerpoint
Sophia grant 3100849 lang6099 power point presentationl
Snoring
Ashley
Blenderman by panda_apps_presentation
Prezentacja1
Real Madrid, trayectoria de su estadio
Ad

Similar to A Profile of the Backoff PoS Malware that Hit 1000+ Retail Businesses (20)

PPTX
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
PPTX
Malware in the Wild: Evolving to Evade Detection
PPTX
PoS Malware and Other Threats to the Retail Industry
PDF
Lastline Case Study
PPT
Next Generation Advanced Malware Detection and Defense
PPTX
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
PDF
Paolo Passeri - A Multi Layered Approach to Threat Intelligence
PDF
Understanding Advanced Threats and How to Prevent Them
PDF
SunbeltLabs Quarterly Briefing Malware Unmasked
PDF
Staying One Step Ahead with Zero-Day Protection
PDF
Sandboxing
PPTX
Modern Malware by Nir Zuk Palo Alto Networks
PPTX
451 and Cylance - The Roadmap To Better Endpoint Security
PPTX
Now you see me, now you don't: chasing evasive malware - Giovanni Vigna
PPTX
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
PDF
Next Generation Endpoint Prtection Buyers Guide
PDF
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
PDF
Oh... that's ransomware and... look behind you a three-headed Monkey
PPTX
How Malware Works - Understanding Software Vulnerabilities
PDF
Check Point SandBlast and SandBlast Agent
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Malware in the Wild: Evolving to Evade Detection
PoS Malware and Other Threats to the Retail Industry
Lastline Case Study
Next Generation Advanced Malware Detection and Defense
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
Paolo Passeri - A Multi Layered Approach to Threat Intelligence
Understanding Advanced Threats and How to Prevent Them
SunbeltLabs Quarterly Briefing Malware Unmasked
Staying One Step Ahead with Zero-Day Protection
Sandboxing
Modern Malware by Nir Zuk Palo Alto Networks
451 and Cylance - The Roadmap To Better Endpoint Security
Now you see me, now you don't: chasing evasive malware - Giovanni Vigna
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
Next Generation Endpoint Prtection Buyers Guide
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
Oh... that's ransomware and... look behind you a three-headed Monkey
How Malware Works - Understanding Software Vulnerabilities
Check Point SandBlast and SandBlast Agent

More from Lastline, Inc. (6)

PPTX
Lastline RSAC 2018 Highlights
PPTX
Infosec Europe 2017 Highlights | Lastline, Inc.
PPTX
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
PPTX
Most Ransomware Isn’t As Complex As You Might Think – Black Hat 2015
PPT
Introduction to Malware - Part 1
PDF
Full-System Emulation Achieving Successful Automated Dynamic Analysis of Evas...
Lastline RSAC 2018 Highlights
Infosec Europe 2017 Highlights | Lastline, Inc.
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
Most Ransomware Isn’t As Complex As You Might Think – Black Hat 2015
Introduction to Malware - Part 1
Full-System Emulation Achieving Successful Automated Dynamic Analysis of Evas...

Recently uploaded (20)

PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Getting Started with Data Integration: FME Form 101
PDF
Mushroom cultivation and it's methods.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
Approach and Philosophy of On baking technology
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Empathic Computing: Creating Shared Understanding
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
August Patch Tuesday
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
Getting Started with Data Integration: FME Form 101
Mushroom cultivation and it's methods.pdf
Unlocking AI with Model Context Protocol (MCP)
Heart disease approach using modified random forest and particle swarm optimi...
Approach and Philosophy of On baking technology
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
A comparative analysis of optical character recognition models for extracting...
Programs and apps: productivity, graphics, security and other tools
Empathic Computing: Creating Shared Understanding
Per capita expenditure prediction using model stacking based on satellite ima...
Advanced methodologies resolving dimensionality complications for autism neur...
August Patch Tuesday
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Spectroscopy.pptx food analysis technology
Encapsulation_ Review paper, used for researhc scholars
Mobile App Security Testing_ A Comprehensive Guide.pdf
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf

A Profile of the Backoff PoS Malware that Hit 1000+ Retail Businesses

  • 1. Backoff My Point-of-Sale Data! Profiling the Backoff PoS Malware Affecting Retailers Engin Kirda Ph.D., Co-Founder & Chief Architect, Lastline www.lastline.com
  • 2. What is Backoff? • Malware used in numerous breaches in the last year • Secret Service currently estimates 1,000+ U.S. businesses affected • Targeted to PoS systems • Evades analysis Copyright ©2014 Lastline, Inc. All rights reserved. 2
  • 3. Recent and Notable Retail/Payments Breaches • The last year has seen a dramatic escalation in the number of breached PoS systems • Many of these PoS payloads, like Backoff, evaded installed defenses and alarms Copyright ©2014 Lastline, Inc. All rights reserved. 3
  • 4. What is Backoff? [1 Slide Summary from Kyle] • Product screenshot? • Mention evasive behaviors exhibited Copyright ©2014 Lastline, Inc. All rights reserved. 4
  • 5. What is Backoff? • Timing evasion (an anti-VM technique) • Utilizes code obfuscation • Also uses rare and poorly emulated instructions to defeat simple emulators • Attempts to encrypt parts of the command and control traffic Copyright ©2014 Lastline, Inc. All rights reserved. 5
  • 6. How are the attackers deploying it? • Scan for Internet facing Remote Desktop applications • Brute force login credentials • Often successfully find administrative credentials • Use admin credentials to deploy Backoff to remote PoS systems Copyright ©2014 Lastline, Inc. All rights reserved. 6
  • 7. Understanding Evasive Malware Malware authors are not stupid • they got the news that sandboxes are all the rage now • since the code is executed, malware authors have options Evasion defined • Develop code that exhibits no malicious behavior in a traditional sandbox, but still infects the intended target • Can be achieved in a variety of ways… Copyright ©2014 Lastline, Inc. All rights reserved. 7
  • 8. 8 The Evasive Malware Problem Current solutions fail to protect organizations from sophisticated, targeted attacks. Copyright ©2014 Lastline, Inc. All rights reserved.
  • 9. Lastline Labs AV Vendor Review Antivirus systems take months to catch up to highly evasive threats. Copyright ©2014 Lastline, Inc. All rights reserved. 9
  • 10. 3 Ways to Build a Sandbox Not all sandbox solutions can detect highly evasive malware. Copyright ©2014 Lastline, Inc. All rights reserved. 10
  • 11. Virtualized Sandboxing vs. Full System Emulation Even APT Solutions with virtualized sandboxing fail to detect highly evasive malware. Copyright ©2014 Lastline, Inc. All rights reserved. 11
  • 12. Securing Your Organization • At PoS: Accept EMV payments to limit exposure in case of a breach • At PoS: E2E encryption of transaction (POI never has cleartext) • Detect and protect against malware and C&C • Full system emulation approach with Lastline Copyright ©2014 Lastline, Inc. All rights reserved. 12
  • 13. Detect Evasive Malware in Your Network Start your 30-day Lastline trial: http://landing.lastline.com/request-lastline-trial “I would highly recommend Lastline to any company that is entrusted with customer data. Retailers, restaurants, or any organization that is interested in elevating their handling and protection of data could benefit from working with Lastline.” Tom Lindblom CTO, CKE Restaurants Copyright ©2014 Lastline, Inc. All rights reserved. 13
  • 14. Thank You! For more information visit www.lastline.com or contact us at [email protected].

Editor's Notes

  • #6: rtdsc looping (timing evasion) obfuscation uses a mildly obfuscated code (oligomorphic decryptor), multistage encrypted shellcode, runpe/hollowing, encryption track/keylogger data sent to c2 is encrypted; networked based detection of the c2 still quite easy -> enterprise could detect it reliably, but DLP mechanisms would fail
  • #7: Using publicly available services and tools for each step
  • #13: emv reduces the value of stolen transaction data, as the transaction data has a limited number of “re-uses” end to end encryption prevents PoS malware from collecting transaction data, reducing the attack surface build verification and detailed behavioral analysis of all software being pushed to PoS systems could absolutely have stopped many these breaches comprehensive analysis of network traffic could have identified them quickly and easily… began providing protection before samples were seen, and alerts for the first c2 events