Menu
New point-of-sale malware on underground markets for $US2000

New point-of-sale malware on underground markets for $US2000

LusyPOS appears to be a derivative of the Dexter and Chewbacca POS malware

A new kind of point-of-sale malware similar to that which struck Target is being sold in underground markets for $US2000.

The malware, LusyPOS, was found on VirusTotal, a website where people can submit malware samples to see if one of several dozen security applications detects it.

It had also been advertised on an underground carding website, where people buy and sell stolen payment card data, said Brian Minick, vice president of the advanced security business of CBTS, a Cincinnati, Ohio-based security company.

"It's the first we've seen of it," Minick said. "It looks pretty new."

Retailers across the U.S. have been hit hard by malware that scans the volatile memory of computers connected to point-of-sale systems, which handle card payments. Home Depot said it lost 56 million card details to this type of attack over a six-month period earlier this year, one of the largest data breaches on record.

Nick Hoffman, a reverse engineer with CBTS, wrote in a blog post that LusyPOS shares some of the same characteristics as two other well-known POS malware programs, Dexter and Chewbacca.

In a January report, the security company RSA said Chewbacca was a simple of piece of malware but one that had infected the systems of at least 35 retailers.

Minick said it's not uncommon for malware writers to borrow code from other programs to make a new malicious application for profit.

"I think is showing reuse of code that was out there," Minick said in a phone interview Monday. "So these developers are now taking the best of what has been publicly published and reusing that to create a new tool...to try to make a quick buck"

LusyPOS appears to share some of the same source code as Dexter and other characteristics of Chewbacca, Minick said.

For example, LusyPOS uses Tor for communication, which encrypts content. Tor, short for The Onion Router, is a software package that is designed to make people's Web traffic more anonymous by encrypting and routing it through a network of worldwide servers.

Hoffman found LusyPOS on VirusTotal, which lets people submit malware samples to see if they are detected by more than four dozen antivirus programs. The sample was submitted to VirusTotal on Nov. 30, Minick said.

As of recently, LusyPOS was only detected by seven applications, Minick said. Two of those applications flagged LusyPOS for its use of a Tor package.

Tor is a legitimate tool for protecting one's privacy on the Web, but it can easily be incorporated into tools that are malicious.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk


Follow Us

Join the newsletter!

Error: Please check your email address.

Tags TargetCBTSsecurityHome Depotmalware

Featured

Slideshows

Tech industry comes together as Lexel celebrates turning 30

Tech industry comes together as Lexel celebrates turning 30

Leading figures within the technology industry across New Zealand came together to celebrate 30 years of success for Lexel Systems, at a milestone birthday occasion at St Matthews in the City.​

Tech industry comes together as Lexel celebrates turning 30
HP re-imagines education through Auckland event launch

HP re-imagines education through Auckland event launch

HP New Zealand held an inaugural Evolve Education event at Aotea Centre in Auckland, welcoming over 70 principals, teachers and education experts to explore ways of shaping and enhancing learning using technology.

HP re-imagines education through Auckland event launch
Reseller News ICT Industry Awards 2017 - Meet the winners...

Reseller News ICT Industry Awards 2017 - Meet the winners...

Reseller News honoured the industry’s finest on a standout evening for the New Zealand channel, recognising the achievements of established and emerging partners on a memorable night in Auckland.

Reseller News ICT Industry Awards 2017 - Meet the winners...
Show Comments