Skip to main content

Terminal Security

Prerequisites

Before diving into terminal security, understand:

Your terminal is a target. Skimmers, malware, and tampering can drain accounts before anyone notices.

The good news: most attacks are preventable with basic vigilance and proper configuration.

On this page

The Threat Landscape

Attack Types by Frequency

AttackHow CommonDetection DifficultyTypical Loss
Skimmers/overlaysCommonMedium (visual inspection)High
POS malwareCommonHard (no visible signs)Very High
Employee theftUncommonEasy (patterns visible)Medium
Terminal swapRareMediumHigh
ShimmersGrowingHard (hidden inside)High

Physical Attacks

Skimmers

What they are: Devices placed over or near the card slot that capture magnetic stripe data when cards are swiped.

Types:

TypeWhere InstalledWhat It Captures
Overlay skimmerOver card slotMag stripe data
Pinhole cameraNear keypadPIN entry
Keypad overlayOver keypadPIN entry
Internal skimmerInside terminalMag stripe data

Detection:

Daily terminal inspection:
□ Wiggle the card slot - is it loose or different?
□ Check for unusual bumps or additions
□ Compare to a known-good terminal photo
□ Look for tiny holes (camera placement)
□ Feel the keypad - does it seem thicker?
□ Check for anything blocking the tamper labels

Shimmers

What they are: Paper-thin devices inserted INTO the chip slot that intercept chip card data.

Why they're dangerous:

  • Not visible from outside
  • Can capture chip data
  • Only detected by card reading issues

Detection:

  • Cards feel tight or don't insert smoothly
  • Increased chip read failures
  • Look inside slot with flashlight

Terminal Swap

What it is: Attacker replaces your terminal with a modified one that looks identical but captures all data.

Prevention:

  • Secure terminals physically (bolts, cables)
  • Serial number inventory
  • Tamper-evident seals
  • Regular serial number verification

POS Malware

POS malware is software that captures card data from terminal memory before encryption.

How It Works

The vulnerability window: After the card is swiped but before the data is encrypted and sent to the processor, it exists briefly in terminal memory. Malware captures it there.

Common POS Malware Families

MalwareHow It SpreadsWhat It Does
BackoffRemote access exploitMemory scraping
PoSeidonPhishing, weak RDPMemory scraping + keylogging
RawPOSSupply chain, infected updatesMemory scraping
TreasureHunterPhishingMemory scraping, exfiltration

How Malware Gets In

VectorHow to Prevent
Weak remote accessDisable RDP, use VPN, strong auth
PhishingEmployee training, email filtering
Supply chainVerify software sources, signed updates
Weak passwordsStrong credentials, no defaults
Unpatched systemsRegular patching

Prevention: Network Security

Segment Your Payment Network

Payment terminals should be on their own network segment:

Internet
|
[Firewall]
|
├── Corporate network (workstations, email)
└── Payment network (terminals only)
|
[Payment terminals]

Why this matters:

  • Malware on a workstation can't reach terminals
  • Limits lateral movement
  • Easier to monitor

Terminal Network Rules

Payment network segment rules:
□ No internet access except to processor IPs
□ No inbound connections from corporate network
□ No peer-to-peer between terminals (usually)
□ Logging all traffic in and out
□ Whitelist only necessary ports (usually 443)

Secure Remote Access

If terminals need remote management:

DoDon't
VPN with MFADirect RDP exposure
Whitelisted IPs"Open to internet"
Session recordingUnmonitored access
Individual accountsShared credentials

Prevention: Physical Security

Terminal Placement

PlacementRisk LevelWhy
Fixed, visible counterLowStaff can monitor
Fixed, low visibilityMediumHarder to watch
Mobile (customer hands)MediumOut of sight briefly
Unattended (kiosk)HighNo supervision

Physical Controls

Physical security checklist:
□ Terminals bolted or cabled to counter
□ Tamper-evident seals on terminal housing
□ Serial number documented and verified
□ Daily visual inspection (opening, closing)
□ Surveillance camera covering terminal
□ Staff trained on what to look for

Tamper Detection

Most modern terminals have tamper detection:

  • Opens housing = terminal bricks
  • Movement detection alerts
  • Mesh protecting internals

Check: Is your terminal's tamper detection enabled and monitored?


E2EE vs. P2PE

Both encrypt card data at the terminal. The difference is validation and scope reduction.

E2EE (End-to-End Encryption)

What it is: Terminal encrypts card data before it hits your network. You can't decrypt it.

Limitation: Not validated by PCI SSC. Doesn't automatically reduce PCI scope.

P2PE (Point-to-Point Encryption)

What it is: E2EE that's been validated by the PCI Security Standards Council.

Benefit: Using a PCI-validated P2PE solution can dramatically reduce your PCI scope (SAQ P2PE vs. SAQ D).

Comparison

FactorE2EEP2PE (validated)
Encryption at terminalYesYes
You can decryptNoNo
PCI SSC validatedNoYes
Scope reductionMaybeGuaranteed
CostLowerHigher
Device optionsMoreFewer

Recommendation: If you're Level 1 or dealing with significant PCI burden, P2PE validation is worth the premium.

See E2EE vs P2PE for detailed comparison.


Employee Training

Your staff are your first line of defense.

What Staff Should Know

Staff training checklist:
□ How to inspect terminals (daily)
□ What skimmers and overlays look like
□ Who to report suspicious activity to
□ Never let unknown technicians access terminals
□ Verify technician identity (call company directly)
□ Don't plug unknown USB devices into POS systems
□ Report unusual terminal behavior

Social Engineering Red Flags

ScenarioRed Flag
"I'm from [processor], here to update your terminal"Unscheduled visit
"I need to install this update on your register"Unknown software
"Give me your terminal to check something"Taking terminal away
"I need your admin password to fix an issue"Password request

Rule: Always verify technicians by calling your processor/vendor directly using a known number (not one they give you).


Incident Response

Signs of Compromise

SignalWhat It Might Mean
Cards getting declined that usually workTerminal issue or tampering
Customer complaints of fraud after visitingCard data stolen at your location
Card brand notification of fraud clusterCommon Point of Purchase (CPP) identified
Terminal behaving strangelyPossible malware
Unknown network traffic from payment segmentExfiltration attempt

If You Suspect Compromise

Immediate actions:
□ Stop using the suspected terminal
□ Preserve evidence (don't wipe or reset)
□ Document everything observed
□ Contact your processor
□ Check other terminals for similar issues
□ Review recent transactions for patterns
□ Start Breach Response if confirmed

See Breach Response Playbook for full incident response.


Terminal Inspection Checklist

Use this daily (opening and closing):

Visual Inspection:
□ Terminal looks same as yesterday?
□ No new devices attached?
□ Card slot feels normal?
□ Keypad feels normal thickness?
□ No unusual holes or additions?
□ Tamper seals intact?
□ Serial number matches inventory?
□ Cable connections secure?

Functional Check:
□ Terminal powers on normally?
□ Test transaction works?
□ No unusual screens or messages?
□ Receipts printing correctly?

Tip: Take photos of your terminals for comparison. Keep photos in a secure location.


Test to Run

Terminal security audit (monthly):

Network:
□ Are terminals on segmented network?
□ What IPs can terminals reach?
□ Is remote access secured (VPN, MFA)?
□ When was terminal software last updated?

Physical:
□ Are terminals physically secured?
□ Are tamper seals in place and intact?
□ Serial numbers match inventory?
□ Staff trained on inspection?

Encryption:
□ What encryption method (E2EE, P2PE)?
□ Is it working (test transaction)?
□ When were encryption keys last rotated?

Scale Callout

Business TypeFocus
Single location, staffedDaily inspection, basic network hygiene
Multiple locationsCentralized monitoring, regular audits, standardized config
Unattended terminals (kiosks)Heavy physical security, cameras, more frequent inspection
High-value transactionsP2PE, network segmentation, enhanced monitoring
Franchise/distributedTraining consistency, compliance verification, audit program

Where This Breaks

  1. Unattended terminals. Kiosks and unattended payment points are high-risk. Physical security, cameras, and frequent inspection are essential.

  2. Third-party access. Technicians, cleaners, and delivery people can all access terminals. Verify identities and supervise access.

  3. Old terminals. Legacy terminals may lack tamper detection, encryption, or security updates. Replacement may be cheaper than the breach.

  4. Franchisee compliance. If you're a franchisor, your franchisees' terminal security is your brand risk. Audit and enforce.


Next Steps

Basic security?

  1. Implement daily inspection → Use the checklist above
  2. Segment your network → Isolate payment systems
  3. Train your staff → What to look for, who to call

Upgrading security?

  1. Evaluate P2PE → E2EE vs P2PE
  2. Add monitoring → Network traffic, terminal health
  3. Regular audits → Monthly using the checklist

Had an incident?

  1. Start breach response → Breach Response Playbook
  2. Preserve evidence → Don't reset or wipe
  3. Contact processor → They'll guide investigation

See Also