Blur Image

Varyon's POS System
to Increase Card Swipes

Industry

Information Technology

Concern

System Security

Country

Germany

BulletProofed

Varyon's POS System
to Increase Card Swipes

Industry

Information Technology

Concern

System Security

Country

Germany

A man scrolling in a laptop Blur Image of 3D cube
Round Image of a Man Blur Image of 3D Tennis Ball
"Our POS systems have witnessed a jump in card swipes and a reduction in security issues."
Sascha Proksch-Gall

CEO

Client Since 2019

Oh the POSsibilities

Answering the 5 W's…

Who

What

When

Where

Why

Varyon IT is a family-run service company that provides support for POS systems, video surveillance, and IT solutions for its gastronomy clients.
The client wanted to strengthen its card system that used JAVA-based payment apps and foray further into the field.
The client wanted the task to naturally develop as the business grew.
At restaurants, kiosks, and other outlets where its POS systems are operational.
To encrypt customer data, decrease security-related issues, and increase footfall.
Blur 3D cone Varyon Website
Purple Circle Image

Varyon is a family-run service company that offers DACH* comprehensive support in the IT landscape, manages the cash register system, regularly checks the security technology, and ensures good sound with the latest audio systems. The company caters to a long list of gastronomical clients. Varyon deals in:

Blur cookie image
Cashier 3D Icon

Cash

Audio Speaker 3D Illustration

Audio

Play Now Button 3D recorre Icon

Video

3D gear setting

IT

Blur blue Image

*The DACH region refers to the three Central European countries of Germany (D), Austria (A), and Switzerland (CH).

Varyon's Concerns

POS security affects the service industry as the system is not well encrypted.
Initial research revealed a number of high-profile security breaches resulting from the abundance of point-of-sale malware.

Warning Icon

Lack of end-to-end security

Warning Icon

Abundant point-of-sale malware

Warning Icon

Slow payment processing

Blur Tube icon
Blur Star icon

Taking Up the
Challenge

Our research into the state of card data within Varyon POS system revealed the following:
Arrow Icon

Core components are written in Java. Java is a “write once, run anywhere” (WORA) programming language that runs on a Java Virtual Machine (JVM).

Arrow Icon

The main application is started by a C++ launcher.

Arrow Icon

Includes Java 8 and MySQL utilities.

Issues with Data Encryption
Encryption 3D icon

Not always encrypted
in transit

Cyber Security 3D Icon

Data is partially
encrypted

PSD 3D Data center

Data is rarely encrypted
in memory

Blur Icon
Retail Store

The product had an authentication override system- to authenticate a transaction, the system is required to contact the vendor to receive a proper override.

The problem was in its override code generation algorithm. This algorithm could be easily reverse-engineered to continually generate valid authentication codes to allow an on-site attacker to access the administrative functions of the POS.

Blur Cube Image

Nothing Ventured,

Nothing Gained.

Nothing Ventured, Nothing Gained.

To develop a proof-of-concept to overturn the issues at hand,
we undertook a decompilation analysis.

Decompilation is a type of reverse engineering that performs
the opposite operations of a compiler.

Steps to Cover:

Arrow Icon

Hard-Coded Credentials

Arrow Icon

Override

Arrow Icon

Auto-update

No security 3D Icon

Security Issues

3d rendering of cute icon illustration of broken chat bubble

Interoperability Issues

3d rendering of cute icon illustration of broken chat bubble

Error Correction

Blur Circle Image Original Application Source
Blur Image

Step 1 Hard-coded Credentials

Findings:

  • Identified root database credentials defined as a password constant in the application source.
  • Several usages of the database password are constant within the application. User-Defined Functions (UDF) may be used to achieve code execution by the MariaDB root user.
  • We are able to demonstrate an attack that leverages these components in order to achieve SYSTEM code execution against the database server.
Code

Step 2 Override

Findings:

  • Came across an override button on the employee login dashboard.
  • Used the override code provided by the dialog to determine the correct override key. The override key is calculated using the override code.
  • As there weren't any cryptographic operations involved, so we decided to write a keygen.
  • Reimplemented the keygen in Python to generate valid override keys.
  • This allowed us to bypass all login dialogs throughout the application.
Code- Public Static String

Step 3 Auto-update

Findings:

  • Used 'DBBackup.getSoftwareState()' to retrieve the version of the database's installation binary and its update.
  • Pulled installer file using ‘installerFileName’.
  • Discovered that we could exploit the auto-update “feature” by manually updating the database installation binary.
Highlighted DBBackup.get Software State

Applying Proof of Concept

Tube icon
Service Provider Data Center

Our Plan:

Firmware Applet created to process transactions.
Modified and implemented information policies.
Create secure, separate routes for card swipes.

Way forward

Implemented application whitelisting.
Conducted regular vulnerability testing.
Segmented networks utilized by the system.

Hitting
the Jackpot

With a new framework in place, Varyon IT witnessed an increase in successful card swipes, minimum transaction failures, a decrease in downtime, and much more.

Blur Star Icon

Surpassing Daily Expectations

Portrait of Monis
Monis Fazal

Senior IT Executive

6 Years of Experience

Associated with the client
for the past 2 years.

Proficiency with Tools and
Applications:

Amadeus, Office 365, Team Viewer, Zendesk, Amadeus 360, Google applications, Digital Signage, Lightspeed G-series, and Menu Service

The project requires knowledge of Office 365 to manage the client's Microsoft account, excel, and basic troubleshooting skills of POS machine. The client is involved in providing full IT support to the hospitality industry, along with all data management tasks.
Monis not only takes care of the daily tasks but also played a key role in the project to bulletproof the security of the card swipes for POS systems.
Xibo- Dashboard
MEC-Code-Gruppen
Tagesabschluss
Chat