Aloha point-of-sale terminal, sold on eBay, yields security surprises

An HP researcher's findings highlight ongoing problems with POS software and hardware

Matt Oh, senior malware researcher with HP Security Research

Matt Oh, senior malware researcher with HP Security Research

Matt Oh, a senior malware researcher with HP, recently bought a single Aloha point-of-sale terminal -- a brand of computerized cash register widely used in the hospitality industry -- on eBay for US$200.

Oh found an eye-opening mix of default passwords, at least one security flaw and a leftover database containing the names, addresses, Social Security numbers and phone numbers of employees who had access to the system.

His findings have received a fair amount of attention due to the role of such systems in high-profile data breaches at retailers including Target, Neiman Marcus and Michaels.

"What we found was that the overall state of security of the system was very poor," he wrote in a blog post describing his analysis.

Even second-hand POS systems aren't cheap, so it's unlikely that cybercriminals would spend hundreds of dollars on a chance that a few contain personal data.

But Oh's research illustrates the security issues facing the hospitality industry, beset by outdated POS systems which it sometimes cannot afford to update.

Oh answered questions about his findings with IDG News Service via email because he has not finished media training required by HP.

He wrote companies don't appear to be paying enough attention to security issues with their POS terminals, and older systems are often still in use, which may not be as secure, he wrote. Unknown software vulnerabilities also pose a risk.

"There are a lot of POS terminals out there, and we don't know how many of them are vulnerable to simple attacks," he wrote by email.

The Aloha POS system is sold by NCR, which came under its wing with its acquisition of Radiant Systems in July 2011 for $1.2 billion. It is one of the most popular systems in the hospitality industry behind those of Micros Systems, which Oracle bought last month for $5.3 billion.

POS systems may seem like glorified electronic cash registers but they're actually closer to ERP systems, tracking inventory, logging employee actions and handling other management functions, said Joseph Snell, CEO of Viableware, a Kirkland, Washington, company.

Snell has had a lot of conversations with companies about POS systems. His company sells a product called Rail Pay that is designed to speed up settling a bill at a restaurant, which integrates with POS systems.

Some smaller businesses he's seen could not be compliant with the Payment Card Industry's Data Security Standard (PCI-DSS) without upgrading their systems, Snell said. PCI-DSS is a set of security recommendations mandated by Visa and MasterCard for businesses processing payment cards.

The restaurant business is low-margin and highly competitive, which impacts spending on technology such as POS systems. "You can freely spend yourself out of business," Snell said.

Second-hand POS systems on eBay, for example, may offer a cheaper alternative to new equipment, but pose a risk of acquiring out-of-date software or systems with longstanding security weaknesses.

Even deep-pocketed companies are finding it increasingly difficult to keep hackers out of their POS systems.

Target, Neiman Marcus and Michaels said their POS systems were infiltrated by hackers, illustrating how intruders are still finding weaknesses in well-maintained systems.

Target's breach, in which it lost details of 40 million payments cards and 70 million other personal records, was attributed in part to malicious software called a "RAM scraper." The malware collects unencrypted card details from a computer's memory just after a card is swiped.

POS systems have long been a mysterious area for security researchers due to their pricey hardware and software, Oh said.

From the system he bought on eBay, Oh analyzed an application called "Aloha Table Service 5.3.24," which bore a copyright notice of Radiant Systems from the 1990s.

The software ran on a slimmed down version of Microsoft's Windows XP operating system for "embedded" devices such as POS terminals. The last time Windows security updates were applied was around March 2007.

Oh said a business was using the Aloha device "less than a few months ago" even though it is years old.

He also found a memory-related problem known as a "heap overflow" within a component called the Aloha Durable Messaging Service, which shuttles information between front-end and back-end systems.

If exploited, the heap overflow "could provide an attacker with full system level control of the target system," he wrote via email.

POS systems are generally supposed to be segregated from the Internet. But restaurants often make configuration errors, such as not properly isolating them from the free guest Wi-Fi, providing a possible point of entry into the network.

That would "present a big problem -- a vulnerable XP machine waiting for remote attack," Oh wrote.

NCR public relations officials did not respond to repeated requests for comment. But Snell said NCR appears to have made great effort shoring up security since it bought Radiant.

Snell said Viableware demonstrated its Rail Pay system around the end of 2011 to P.F. Chang's China Bistro, a restaurant chain that disclosed a credit and debit card breach last month.

The company used the Aloha software, Snell said, but a P.F. Chang's spokeswoman declined to confirm it.

However, P.F. Chang's was listed as a customer of Radiant Systems in an SEC filing in March 2011, a few months before Radiant's acquisition by NCR.

Snell said his conversations with senior executives at P.F. Chang's gave him the impression the company was technically competent when it came to POS security.

But he added, "They had a hole in their armor, and an arrow went right through it."

P.F. Chang's said on July 1 the breach remains under investigation. The company temporarily shut down its POS system and switched to an old-style manual imprinting system for processing payment cards to prevent further damage.

Since then, it has provided its U.S. restaurants with "an encryption-enabled terminal to securely process credit and debit card information," wrote CEO Rick Federico.

Send news tips and comments to Follow me on Twitter: @jeremy_kirk

Join the CSO newsletter!

Error: Please check your email address.

Tags HPncrViablewaresecuritydata breachmalware

More about eBayHPIDGMicrosoftNCR AustraliaOracleRadiant SystemsSECVisa

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Jeremy Kirk

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts