Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Stop admin and master service.

  2. Upgrade your server to 20220725.22. For customers running on 20220531, we also back-ported the fix to patch release 20220531.38.

    1. How to update your CAS server: https://generalbytes.atlassian.net/l/cp/uDWwYSuQ

  3. Modify your server firewall settings. Ensure that your CAS admin interface running on TCP ports 7777 or 443 is only accessible from IP addresses you trust - like your office or your homes.

    1. Firewall configuration guide: https://generalbytes.atlassian.net/l/cp/ikf0h0Ld

  4. Start admin service.

  5. Enter CAS interface and deactivate all your terminals to prevent any sales on machines. Alternatively, you can deactivate only two-way machines.

  6. Review all your CAS users, their permissions, and groups.

    1. Make sure only users that you trust have administration rights.

  7. Review that the attacker added no terminals. If you were breached, you might find BT123456. Delete any unrecognized Terminals (not just BT123456).

  8. Activate the terminals.

  9. In case you were breached, review admin.log, where you might find more details on the attacker's activity. Search for activity around the message "Server activated."

...