Visa warns of key logger increase

Credit card company Visa has issued a warning to its clients to beware of the increase of key logging attacks at their payment terminals.

Key logging

Visa has warned its customers to be aware of the increased risk posed by key-logging trojans.

The credit card company claimed in recent weeks it had seen a rise in this technique, which obtains information from victims through software that captures and records their keystrokes.

The particular malware affecting Visa payment systems sends payment card data to a fixed IP address or email that the hacker can then access and use as he or she sees fit.

"In these instances, the hacker is able to install key logger malware on the point of sale (POS) system due to insecure remote access and poor network configuration," Visa said in a statement.

Visa admitted that key loggers can be difficult to detect but has recommended a list of security measures for retailers using the system to take on board as a precautionary measure.

These include removing unnecessary remote access, implementing a secure network configuration, regularly observing which software is installed and ensuring anti-virus is kept up-to-date.

Although Visa blames poor practice for the success of key logging, another security firm has put this rise down to the increase in Windows-based payment terminals, leaving systems open to the type of malware a home or office PC could get infected with.

"Trojan-driven keylogger attacks have been on the rise for home and office PC users for some time, but companies and home users are getting wise to the problem and are installing IT security software on their machines," said Mickey Boodaei, chief executive of Trusteer.

"For retailers, however, the problem is more complex, as many of their terminals are subject to leasing and maintenance contracts, meaning that they tend to rely on the supplier/maintained for their IT security protection."

Featured Resources

Unlocking collaboration: Making software work better together

How to improve collaboration and agility with the right tech

Download now

Four steps to field service excellence

How to thrive in the experience economy

Download now

Six things a developer should know about Postgres

Why enterprises are choosing PostgreSQL

Download now

The path to CX excellence for B2B services

The four stages to thrive in the experience economy

Download now

Recommended

HackBoss malware is using Telegram to steal cryptocurrency from other hackers
cryptocurrencies

HackBoss malware is using Telegram to steal cryptocurrency from other hackers

16 Apr 2021
What is a Trojan?
Security

What is a Trojan?

25 Feb 2021
Mastering endpoint security implementation
Security

Mastering endpoint security implementation

16 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
University of Hertfordshire's entire IT system offline after cyber attack
cyber attacks

University of Hertfordshire's entire IT system offline after cyber attack

15 Apr 2021
Xiaomi Redmi Note 10 Pro review: Champagne tastes on a lemonade budget
Mobile Phones

Xiaomi Redmi Note 10 Pro review: Champagne tastes on a lemonade budget

13 Apr 2021