>> what is the types of processes to protect from RAM pilfering? I have to
>> admit I never thought this one.
>>
>> http://www.theregister.co.uk/2009/12/09/ram_scraper_credit_card_theft/

> Considering "...The RAM scraper dumped the contents of the server’s
> live memory into a file named dumper.dll in the Windows system
> subdirectories..." it (the scraper) must have had at least local admin
> access, if not system access, in order to write a file there (unless
> security was thoroughly hosed on the system in the first place).
> 
> Wouldn't simply zeroing out the buffer that held the data mitigate
> something like this?  Is that too easy?  I know security-savvy
> programmers are rare but it seems like an easy win.

The solutions are already there.

Hmm... if it is a POS terminal, why wouldn't it:
        1) be locked down to only allow running of the POS application, and
        2) have "file-integrity monitoring software to alert personnel to 
unauthorized modification of critical system files, configuration files, or 
content files;" [11.5]

--Keith

Keith Young, Security Official
Department of Technology Services
Montgomery County, Maryland
phone - (240) 777-2955 


_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.

Reply via email to