Visa Global Payment System Risk is aware of increasing incidents involving suspects placing skimming devices on point-of–sale (POS) terminals for the purpose of collecting payment card information, including PIN numbers. Perpetrators use this information to create counterfeit cards re-encoded with the stolen card information and make unauthorized ATM withdrawals. The primary targets for these recent skimming events are self-checkout terminals in supermarkets. However, any POS terminal may be at risk, including those that are often unattended, such as terminals near deli counters, coffee stands, etc. The perpetrators are mobile and will target multiple stores within a geographic area for a period of time before moving on to a new location. Most entities targeted are using payment devices that have not yet been upgraded to accept EMV cards.
Placement of Skimming Devices
Skimming devices can be placed at any time of the day but placement usually occurs during slower times of business when the perpetrators can go undetected by employees or other customers. The perpetrators will usually work in teams of two or more with one person being a lookout, one person placing the skimming device on the POS terminal and another creating a barrier so that no one can observe the skimming device being placed. Perpetrators have been known to use large items such as packs of paper towels to block the view of POS terminals. In some instances, it was reported that the suspects created a distraction in the store by faking a medical incident or causing commotion that distracted the attention of store personnel away from the POS terminals. The skimming devices will mimic the look of the front of the POS terminal.
Recommended Inspection & Response Actions
1. Prevention Through Device Inventory Management
- In accordance with PCI DSS Requirement 9.9, ensure implementation of security controls to protect POS devices from tampering and substitution. Examples include:
⇒ Maintain a list of devices including the device serial number or other method of unique identification.
⇒ Keep a list of device location either by store or physical location within the store itself (i.e., self-checkout, deli counter, manned checkout).
⇒ Train personnel to be aware of suspicious behavior and to report tampering or substitution of devices.
⇒ Verify the identity of any third-party persons claiming to be repair or maintenance personnel, prior to granting them access to modify or troubleshoot devices.
2. Physical Inspection of POS Devices
- Implement security procedures to inspect POS devices at least twice each day and at random times.
- Physically examine the device. Skimming devices are typically attached with minimal adhesive allowing them to be place and removed with ease, so devices may be detected by giving the front of the POS/PED a good grab-and-pull. Weighing the devices may also identify tampering.
- Please note some skimming devices are Bluetooth enabled and data can be captured without the device needing to be recovered.
- When inspecting devices, use backup security personnel to monitor from a distance as suspects may watch compromised terminals and suspects are trained in counter surveillance to avoid detection/arrest.
3. Device Recovery Response
- If a skimming device is discovered on a POS terminal, do not handle it, as evidence may be damaged.
- Notify local law enforcement and the FBI or USSS office so they can recover the skimming device.
- Protect any video surveillance that may be used to identify any perpetrators and confirm timing of when the device was placed on the POS terminal.
- Initiate incident response procedures and notify your Acquirer so that Visa can assist with the investigation.
Information from VISA April 2016
For other questions, please contact Cyber Intelligence & Investigations via email at USFraudControl@visa.com
What is end of support?
Beginning January 12, 2016, only the most current version of Internet Explorer available for a supported operating system will receive technical support and security updates. Internet Explorer 11 is the last version of Internet Explorer, and will continue to receive security updates, compatibility fixes, and technical support on Windows 7, Windows 8.1, and Windows 10.
Internet Explorer 11 offers improved security, increased performance, better backward compatibility, and support for the web standards that power today’s websites and services. Microsoft encourages customers to upgrade and stay up-to-date on the latest browser for a faster, more secure browsing experience.
What does this mean?
It means you should take action. After January 12, 2016, Microsoft will no longer provide security updates or technical support for older versions of Internet Explorer. Security updates patch vulnerabilities that may be exploited by malware, helping to keep users and their data safer. Regular security updates help protect computers from malicious attacks, so upgrading and staying current is important.
Potential risk of using older versions of Internet Explorer:
Without critical browser security updates, your PC may become vulnerable to harmful viruses, spyware, and other malicious software which can steal or damage your business data and information.
Businesses that are governed by regulatory obligations such as HIPAA should conduct due diligence to assess whether they are still able to satisfy compliance requirements using unsupported software.
Lack of ISV Support
Many Independent Software Vendors(ISVs) no longer support older versions of Internet Explorer. For example, Office 365 takes advantage of modern web standards and runs best with the latest browser.
WANT TO SAVE SOME SERIOUS TIME?
Insight Retail Software is proud to announce the release of EDI Manager. Almost every vendor can supply you with an electronic invoice of your order, and our new EDI Manager allows you to import these invoices directly into backOffice™.
Once imported, backOffice™ will identify new products received in the order, any price or cost changes and the quantity shipped of each item. With the click of a button, new items are added, price and cost changes are made, and an order is created in the inventory module!
Just another way to run your business more effectively and save you time.
For more information please complete the form below. Thank you!
Take a sneak peek at backOffice™ V3
This 3-Part Series of Demonstration Videos provides a nice overview of backOffice™ Features.