Two point-of-sale (POS) malware resources have been deployed by a risk actor to steal the information and facts of over 167,000 credit score cards from payment terminals.
The findings come from security industry experts at Team-IB, who published an advisory about the malware strategies on Monday.
“On April 19, 2022, the Group-IB Danger Intelligence discovered a Command and Manage (C2) server of the POS malware identified as MajikPOS,” reads the doc.

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).
➤ Get Mullvad VPN with 12% Discount
“The investigation of [command and control] C&C revealed that it was badly configured and the way it experienced been developed supplied an capability to extract stolen qualifications for additional examination.”
The staff experienced then analyzed the server and concluded that it experienced also hosted a C2 administrative panel of a different POS malware called Treasure Hunter, also utilized to obtain compromised credit score card details.
“After analyzing the malicious infrastructure, Team-IB researchers retrieved information and facts about the contaminated units and the credit score playing cards compromised as a final result of this campaign,” the cybersecurity specialists wrote.
Considering that at minimum February 2021, the operators have reportedly stolen additional than 167,000 payment information (as of September 08, 2022), primarily from US-centered victims.
“According to Group-IB’s estimates, the operators could make as a lot as $3,340,000 if they basically make a decision to provide the compromised card dumps on underground community forums.”
Extra frequently, the security researchers have claimed that POS malware has turn out to be a software that is seldom employed, as an escalating variety of danger actors in the carding business are switching to JavaScript sniffers to gather card text information from e-commerce internet sites.
Nonetheless, some danger actors continue on to use these procedures, like the types at the rear of the campaigns higher than, which in accordance to Group-IB, are however lively.
“Malware is just just one click on absent,” Erfan Shadabi, a cybersecurity pro from comforte, explained to Infosecurity.
“The two most significant factors an firm can do are: one particular, spread cybersecurity recognition and use a zero-trust strategy to be certain that customers only get accessibility to delicate facts when they have authorization and only when it is certainly important. And two, protect the facts.”
According to Shadabi, common encryption procedures do the job in some scenarios, but some algorithms can be conveniently cracked, and essential administration and other operational problems make plain details encryption unattractive.
“Using a stronger, much more versatile knowledge-centric system this sort of as tokenization indicates that details structure can be preserved though delicate data factors are obfuscated with representational tokens,” Shadabi extra.
“Enterprise purposes help tokenized details considerably superior, skirting the require to de-safeguard the data in purchase to perform with it within a company workflow.”
The Team-IB advisory will come times right after the Federal Bureau of Investigation (FBI) issued an announcement warning learners against financial loan forgiveness frauds aimed at stealing their own and economical information.
Some sections of this report are sourced from:
www.infosecurity-journal.com