• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

POS Malware Used to Steal Details of Over 167,000 Credit Cards

You are here: Home / General Cyber Security News / POS Malware Used to Steal Details of Over 167,000 Credit Cards
October 25, 2022

Two point-of-sale (POS) malware resources have been deployed by a risk actor to steal the information and facts of over 167,000 credit score cards from payment terminals.

The findings come from security industry experts at Team-IB, who published an advisory about the malware strategies on Monday.

“On April 19, 2022, the Group-IB Danger Intelligence discovered a Command and Manage (C2) server of the POS malware identified as MajikPOS,” reads the doc.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“The investigation of [command and control] C&C revealed that it was badly configured and the way it experienced been developed supplied an capability to extract stolen qualifications for additional examination.”

The staff experienced then analyzed the server and concluded that it experienced also hosted a C2 administrative panel of a different POS malware called Treasure Hunter, also utilized to obtain compromised credit score card details. 

“After analyzing the malicious infrastructure, Team-IB researchers retrieved information and facts about the contaminated units and the credit score playing cards compromised as a final result of this campaign,” the cybersecurity specialists wrote.

Considering that at minimum February 2021, the operators have reportedly stolen additional than 167,000 payment information (as of September 08, 2022), primarily from US-centered victims. 

“According to Group-IB’s estimates, the operators could make as a lot as $3,340,000 if they basically make a decision to provide the compromised card dumps on underground community forums.”

Extra frequently, the security researchers have claimed that POS malware has turn out to be a software that is seldom employed, as an escalating variety of danger actors in the carding business are switching to JavaScript sniffers to gather card text information from e-commerce internet sites.

Nonetheless, some danger actors continue on to use these procedures, like the types at the rear of the campaigns higher than, which in accordance to Group-IB, are however lively.

“Malware is just just one click on absent,” Erfan Shadabi, a cybersecurity pro from comforte, explained to Infosecurity.

“The two most significant factors an firm can do are: one particular, spread cybersecurity recognition and use a zero-trust strategy to be certain that customers only get accessibility to delicate facts when they have authorization and only when it is certainly important. And two, protect the facts.”

According to Shadabi, common encryption procedures do the job in some scenarios, but some algorithms can be conveniently cracked, and essential administration and other operational problems make plain details encryption unattractive.

“Using a stronger, much more versatile knowledge-centric system this sort of as tokenization indicates that details structure can be preserved though delicate data factors are obfuscated with representational tokens,” Shadabi extra.

“Enterprise purposes help tokenized details considerably superior, skirting the require to de-safeguard the data in purchase to perform with it within a company workflow.”

The Team-IB advisory will come times right after the Federal Bureau of Investigation (FBI) issued an announcement warning learners against financial loan forgiveness frauds aimed at stealing their own and economical information.


Some sections of this report are sourced from:
www.infosecurity-journal.com

Previous Post: «a strategic guide for controlling and securing your data A strategic guide for controlling and securing your data
Next Post: Apple Fixes Actively Exploited iOS and iPadOS Zero-Day Vulnerability Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New Variant of Banking Trojan BBTok Targets Over 40 Latin American Banks
  • How to Interpret the 2023 MITRE ATT&CK Evaluation Results
  • Iranian Nation-State Actor OilRig Targets Israeli Organizations
  • High-Severity Flaws Uncovered in Atlassian Products and ISC BIND Server
  • Apple Rushes to Patch 3 New Zero-Day Flaws: iOS, macOS, Safari, and More Vulnerable
  • Mysterious ‘Sandman’ Threat Actor Targets Telecom Providers Across Three Continents
  • Researchers Raise Red Flag on P2PInfect Malware with 600x Activity Surge
  • The Rise of the Malicious App
  • China Accuses U.S. of Decade-Long Cyber Espionage Campaign Against Huawei Servers
  • Cyber Group ‘Gold Melody’ Selling Compromised Access to Ransomware Attackers

Copyright © TheCyberSecurity.News, All Rights Reserved.