• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
fbi raids chinese pos business following cyber attack claims

FBI raids Chinese POS business following cyber attack claims

You are here: Home / General Cyber Security News / FBI raids Chinese POS business following cyber attack claims
October 27, 2021

Shutterstock

The FBI has raided the Jacksonville warehouse of a Chinese stage of sale (POS) terminal vendor soon after experiences that the terminals ended up being made use of as aspect of a network distributing malware.

The enterprise in issue, PAX Technology, is primarily based in Shenzhen, China. FBI agents executed a court docket-licensed look for at the firm’s warehouse in Jacksonville, Florida.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


In a statement to Jacksonville-based mostly WOKV.com, the FBI claimed that in partnership with Homeland Security Investigations, Customs and Border Security, Office of Commerce, and Naval Criminal Investigative Services, and with the assist of the Jacksonville Sheriff’s Office, it executed “a courtroom-authorized research at this place in furtherance of a federal investigation”.

“We are not mindful of any physical danger to the bordering local community connected to this look for. The investigation remains energetic and ongoing and no further details can be verified at this time.”

In accordance to a report by Krebs on Security, the FBI started investigating PAX after a major US payment processor started inquiring issues about uncommon network packets originating from the company’s payment terminals.

A supply instructed the publication that the payment processor found that the PAX terminals were being made use of both of those as a malware dropper and a C2 server for staging attacks and collecting details.

The supply also explained that two economic companies, one in the US and just one in the UK, experienced begun removing PAX terminals from the payment infrastructure, incorporating that that there was evidence that these terminals ended up applied to mount cyber attacks.

“The packet measurements don’t match the payment info they should be sending, nor does it correlate with telemetry these gadgets may well display if they ended up updating their software program. PAX is now declaring that the investigation is racially and politically inspired,” the source informed Krebs on Security.

FBI brokers are also investigating at the company’s other place in Jacksonville. Shares of PAX plunged 43.3% in Hong Kong and stopped buying and selling on news of the raid. PAX is the third-biggest provider of digital payment terminals in the world, soon after Florida-based mostly Verifone and France’s Ingenico.

As noted in IT Pro, the retail sector is a best focus on for cyber criminals as vendors have obtain to a wealth of sensitive information about their customers, who use typically-recurring login details for their accounts.


Some areas of this write-up are sourced from:
www.itpro.co.uk

Previous Post: «ddos attacks are crippling uk voip operators DDoS attacks are crippling UK VoIP operators
Next Post: Cyber Attack in Iran Reportedly Cripples Gas Stations Across the Country cyber attack in iran reportedly cripples gas stations across the»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.