Menu
New attack campaign against SMBs uses a botnet to deliver PoS malware

New attack campaign against SMBs uses a botnet to deliver PoS malware

A group of attackers uses the Gorynych botnet to deploy point-of-sale malware and steal payment card data

A group of sophisticated attackers are repurposing penetration testing tools to break into the networks of small and medium-size businesses worldwide with the goal of infecting point-of-sale systems with malware.

The new attack campaign started in September and has been dubbed operation Black Atlas by researchers from antivirus vendor Trend Micro. The attackers use a wide set of tools to scan the Internet and identify potential weak spots in the networks of various organizations, the researchers said.

Their toolset includes port scanners, brute-force password guessing tools, SMTP (Simple Mail Transfer Protocol) scanners, remote desktop viewers and other attack applications that are easy to find on the Internet.

"Networks with weak password practices are likely to fall victim to this initial penetration testing stage," the Trend Micro researchers said in a blog post.

If the attackers manage to break in, they use additional malware and tools to move laterally across the network and compromise PoS systems. While doing this, they steal various credentials along the way, including email and Facebook passwords.

Once they have access to a PoS system, the attackers install a so-called memory scraping program. These are malware applications that scan the system's RAM for payment card details that are passed from the card reader to the retail software.

The Trend Micro researchers have seen the Black Atlas attackers using multiple PoS malware programs including Alina, NewPOSThings and BlackPOS. The latter was also used in the 2013 attack against Target that resulted in the compromise of around 40 million payment card details.

Because BlackPOS does not have an online data exfiltration method and instead saves the card details to a local text file, the Black Atlas attackers are combining it with a botnet-type backdoor program known as Gorynych or Diamond Fox.

"Gorynych now grabs that text file and does an HTTP POST to complete the data exfiltration," the Trend Micro researchers said. The same botnet is also used to deploy BlackPOS in the first place.

The attackers have compromised businesses around the world, including an unnamed healthcare organization in the U.S., which allowed Trend Micro to perform a deeper analysis. The most affected countries are the U.S., Australia, India, Taiwan, Germany and the U.K.


Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Featured

Slideshows

Tight lines as Hooked on Lenovo catches up at Great Barrier Island

Tight lines as Hooked on Lenovo catches up at Great Barrier Island

​Ingram Micro’s Hooked on Lenovo incentive programme recently rewarded 28 of New Zealand's top performing resellers with a full-on fishing trip at Great Barrier Island for the third year​ in a row.

Tight lines as Hooked on Lenovo catches up at Great Barrier Island
Inside the AWS Summit in Sydney

Inside the AWS Summit in Sydney

As the dust settles on the 2017 AWS Summit in Sydney, ARN looks back an action packed two-day event, covering global keynote presentations, 80 breakout sessions on the latest technology solutions, and channel focused tracks involving local cloud stories and insights.

Inside the AWS Summit in Sydney
Channel tees off on the North Shore as Ingram Micro hosts annual Cure Kids Charity golf day

Channel tees off on the North Shore as Ingram Micro hosts annual Cure Kids Charity golf day

Ingram Micro hosted its third annual Cure Kids Charity Golf Tournament at the North Shore Golf Club in Auckland. In total, 131 resellers, vendors and Ingram Micro suppliers enjoyed a round of golf consisting of challenges on each of the 18 sponsored holes, with Team Philips taking out the top honours.

Channel tees off on the North Shore as Ingram Micro hosts annual Cure Kids Charity golf day
Show Comments