TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

How RAM Scrapers Work: The Tool Behind the Latest Credit Card Hacks

90 pointsby 80ProofPuddingover 10 years ago

11 comments

jimrandomhover 10 years ago
The fundamental problem is that credit cards are built around a model where credit card numbers are theoretically supposed to be secret, but every random retailer has to have them to process transactions. If credit cards were electronic devices, like in Europe, rather than fancy pieces of paper with a number written on them, then fraud would drop, and retailers would be freed of a massive burden. But American banks aren't up to the task of creating that sort of infrastructure, so instead they blame it on whichever poor retailer happened to have its computers broken into.
评论 #8392314 未加载
评论 #8392250 未加载
ChuckMcMover 10 years ago
A long time ago I helped a company get their payment terminal up and running after their first consultant had spent 9 months and $30,000 not getting anything done. The code I got was astonishingly bad and I realized that these folks had no way of evaluating good or bad code, and it depressed me that this was more the 'normal' situation rather than the 'unusual' sort of situation. I hope that in today's target rich environment folks are investing a bit more care into these things but I worry that isn't the case.
Sami_Lehtinenover 10 years ago
It seems that many people are really confused about this stuff. Because if PA-DSS standards are followed, the PC doesn't ever get any actualy credit card data. Yes, it's possible to backdoor / modify / infect / re-firmware or what ever the actua POS terminal, but it has nothing to do with the POS PC. POS terminals are independent systems with their own ram, keyboard, networking, processors, firmware, operating system, and software. I just made credit card transaction, here's all data what the PC get's from the credit card terminal. B2A8AAA4-6585-4D97-8AF7-C2DE0A617E3B for 40€ is successful. So? Feel free to abuse that information, if you find way to do so. So when ever writing stuff like this, it would be very smart to mention if the attack is targeting the PC or the actual POS terminal.
ackalkerover 10 years ago
From what I gather from the article, the systems which RAM scrapers attack were running on general purpose computers, with very similar vulnerabilities.<p>Why isn&#x27;t sensitive software like this built and audited with the same concern for reliability and security as avionics, medical equipment, SCADA, etc.? Certainly the cost in financial losses caused by these attacks makes this a pertinent question.
评论 #8390668 未加载
评论 #8409309 未加载
评论 #8392248 未加载
评论 #8391035 未加载
评论 #8392141 未加载
ultramancoolover 10 years ago
The term &quot;RAM scraper&quot; seems pretty stupid to me.<p>These are likely using hooking. They don&#x27;t scan RAM all the time, instead they patch or inject code into the POS software and then record the data when that code is called.<p>Think of something like Microsoft Detours. RAM scrapers seems a pretty inaccurate description.
评论 #8390914 未加载
lackerover 10 years ago
<i>&quot;Six months before the breach, the company had installed a $1.6 million malware detection system that worked exactly as planned when the intruders began stealing their loot. It even issued multiple alerts for Target’s security staff. But the security staff simply ignored them.&quot;</i><p>That sounds bad, but I wonder if this system was issuing huge numbers of alerts all the time, leaving the security staff no real option but to ignore the alerts. I&#x27;d be curious to see the false positive rate. It seems like for an off-the-shelf security system that you buy, false positives must be a huge problem, because it hasn&#x27;t been tuned to your data.
panarkyover 10 years ago
This article [1] argues that RAM scrapers are only able to work because the point-of-sale systems are running Windows XP.<p>Newer versions of Windows make this exploit far more difficult [2].<p>[1] <a href="http://www.dailytech.com/Appalling+Negligence+DecadeOld+Windows+XPe+Holes+Led+to+Home+Depot+Hack/article36517.htm" rel="nofollow">http:&#x2F;&#x2F;www.dailytech.com&#x2F;Appalling+Negligence+DecadeOld+Wind...</a><p>[2] <a href="http://en.wikipedia.org/wiki/Address_space_layout_randomization" rel="nofollow">http:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Address_space_layout_randomizat...</a>
评论 #8409313 未加载
评论 #8391551 未加载
jason_slackover 10 years ago
so are these hardware that somehow people manage to sneak and install on a store&#x27;s network? How would them monitor traffic and get the credit card info?<p>Edit: The articles does say: &quot;Attackers installed these RAM scrapers surreptitiously on the point-of-sale systems used to scan and process credit and debit card transactions at Albertson’s and Supervalu. The tools make it easy to steal card numbers by the millions as they pass through the system.&quot;<p>But still a bit confusing if these are hardware devices or somehow they install software to do this.
评论 #8390988 未加载
评论 #8391906 未加载
bitJerichoover 10 years ago
I don&#x27;t get it, you spend all this money on card readers, they&#x27;ve got all kinds of anti-hacking software&#x2F;hardware&#x2F;sensors, but the scanner sends the cards as plain text to the register?
coldcodeover 10 years ago
I love the quote about Target. SIX MONTHS BEFORE THE BREACH, THE COMPANY HAD INSTALLED A $1.6 MILLION MALWARE DETECTION SYSTEM THAT WORKED AS DESIGNED AND ISSUED MULTIPLE ALERTS THAT GOT PASSED TO TARGET’S SECURITY STAFF, WHO SUMMARILY IGNORED THEM.
discardoramaover 10 years ago
Would the use of a chip (as is more common in Europe) cut down on this sort of theft?