Latest version of security solutions protect ATMs in remote areas

Kaspersky Embedded Systems Security provides advanced protection for ATMs and PoS (point of sale) systems, as well as other Windows-based embedded devices. Thanks to the release of a new version, the solution now can be remotely managed and updated without hassle on devices located in areas with a 2G internet connection.

This enables the solution to effectively protect ATMs, payment terminals, and other similar appliances in remote areas without affecting their productivity and service availability. In addition, Kaspersky Embedded Systems Security has been upgraded with a new Network Threat Protection component which prevents attacks on a network layer.

In 2019, Kaspersky Security Network statistics, gathered from the company’s solutions, revealed that the amount of malware targeting embedded systems grew by 40% compared to figures from 2018. This suggests that ATMs, PoS, and other similar systems are a tempting target for cybercriminals. Their protection can be a challenging task for devices residing in remote locations where a wireless modem is the only option for internet connection, but the area has poor cellular coverage or is not covered by modern wireless standards (such as 3G and above).

Kaspersky delivers tool for protecting remote workforces, highlighting shadow IT

Kaspersky: APAC will see increase in mobile malware

Weak communication channels may lead to a conflict between traffic flows responsible for the execution of transactions, banking software updates, and management tasks, including the delivery of updates. When a channel is overloaded with traffic between the security solution and its management server, it leads to the unstable operation or even a partial loss of control over the device.

In smaller communities, there are only a few cash machines, or just one, available to citizens. If the community is remote enough, a scenario where an ATM goes down because of an overload in traffic or malicious actions would mean serious trouble. For instance, citizens would be left unable to withdraw cash from their accounts until the issue is fixed.

Optimized traffic volume

Kaspersky has optimized the volume of traffic shared by Kaspersky Embedded Systems Security to reduce the payload. Typically, the server periodically sends security policies to the ATM, which returns the applied settings. It allows for monitoring to show that the policies were not changed.

With the updated Kaspersky Embedded Systems Security, the ATM would not send the whole of the acting policies back to the server, thus reducing the intensity of the data exchange. However, it doesn’t affect control over the device, as the ability to change these policies on the cash machine is strictly regulated by the security solution.

Thanks to this, and other data exchange optimizations, the solution ensures that functions run smoothly even in regions where only a low-speed internet connection, such as that provided by the 2G standard, is available. In fact, its technical requirements for speed starts from 56 kbp/s.

Network attacks

Recently introduced Network Threat Protection also improves ATM and PoS security posture against attacks aimed to break into an operating system. This component monitors both inbound and outbound traffic to detect suspicious network activity and blocks the communication between the device and the source of malicious network activity.

In particular, Kaspersky Embedded Systems Security now can detect and block the following activity:

  • Port scanning. At the preparation stage, cybercriminals may search for open ports, services running on them, and vulnerabilities of these services. The gained information allows malefactors to choose an effective attack vector.
  • Bruteforce. Sometimes, there is an active Remote Desktop Protocol (RDP) on an ATM or PoS, and cyber-attackers can use this for gaining access to the device by trying to “guess” the right password through submitting multiple character combinations to the service.
  • Denial of Service and network exploits. By sending a large amount of data or data in a format that cannot be handled by an application, a cybercriminal can stop the work of an embedded device (Denial of Service) – or abuse an unpatched vulnerability to initiate an infection.

To read more about Kaspersky Embedded Systems Security, please visit the official product page.