Menu
Early version of new POS malware family spotted

Early version of new POS malware family spotted

Dozens of antivirus programs are missing Getmypass, which is similar to BlackPOS

Few antivirus programs were detecting Getmypass, a type of POS malware that has a digital certificate.

Few antivirus programs were detecting Getmypass, a type of POS malware that has a digital certificate.

A security researcher came across what appears to be a new family of point-of-sale malware that few antivirus programs were detecting.

Nick Hoffman, a reverse engineer, wrote the Getmypass malware shares traits that are similar to other so-called RAM scrapers, which collect unencrypted payment card data held in a payment system's memory.

That type of malware has been responsible for large payment card breaches at Target, Neiman Marcus and others, capitalizing on a common weakness in systems that experts say can be fixed with more robust encryption of card details.

Hoffman wrote that Getmypass appears to still be under development. It does not, for example, yet have a command-and-control functionality, which is a way that hackers use to issue commands to the malware.

"Its important to track tools like this from their very young stages so that researchers can watch them develop and eventually grow into the next big tool," Hoffman wrote.

Getmypass isn't particularly advanced, but Hoffman wrote it evaded 55 antivirus scanners on VirusTotal.

Some security programs may miss malware on an initial scan but flag it later for removal if it starts to do some suspicious, such as send data to a remote server.

Trend Micro, which also wrote up an analysis, said it appears the malware is similar to a variant of BlackPOS, a widely used RAM scraper.

Getmypass has functions common to other POS malware, such as the ability to search for credit card data and validate the data to ensure the numbers are valid payment card details.

But it lacks other common features, such the ability to log keystrokes, collect login credentials and move collected data to a non-local file, he wrote.

"This malware seems to be in its infancy," Hoffman wrote. "There are debug strings still existent in the malware indicate to me that the author is still testing the tool or is still actively developing it."

It does, however, carry a digital signing certificate from a publisher called "Bargaining active." Digital certificates are used to sign applications, which may give them a greater degree of legitimacy if scanned by security software.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk


Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags trend microsecuritymalware

Featured

Slideshows

Sizing up the NZ security spectrum - Where's the channel sweet spot?

Sizing up the NZ security spectrum - Where's the channel sweet spot?

From new extortion schemes, outside threats and rising cyber attacks, the art of securing the enterprise has seldom been so complex or challenging. With distance no longer a viable defence, Kiwi businesses are fighting to stay ahead of the security curve. In total, 28 per cent of local businesses faced a cyber attack last year, with the number in New Zealand set to rise in 2017. Yet amidst the sensationalism, media headlines and ongoing high profile breaches, confusion floods the channel, as partners seek strategic methods to combat rising sophistication from attackers. In sizing up the security spectrum, this Reseller News roundtable - in association with F5 Networks, Kaspersky Lab, Tech Data, Sophos and SonicWall - assessed where the channel sweet spot is within the New Zealand channel. Photos by Maria Stefina.

Sizing up the NZ security spectrum - Where's the channel sweet spot?
Kiwi channel comes together for another round of After Hours

Kiwi channel comes together for another round of After Hours

The channel came together for another round of After Hours, with a bumper crowd of distributors, vendors and partners descending on The Jefferson in Auckland. Photos by Maria Stefina.​

Kiwi channel comes together for another round of After Hours
Consegna comes to town with AWS cloud offerings launch in Auckland

Consegna comes to town with AWS cloud offerings launch in Auckland

Emerging start-up Consegna has officially launched its cloud offerings in the New Zealand market, through a kick-off event held at Seafarers Building in Auckland.​ Founded in June 2016, the Auckland-based business is backed by AWS and supported by a global team of cloud specialists, leveraging global managed services partnerships with Rackspace locally.

Consegna comes to town with AWS cloud offerings launch in Auckland
Show Comments