Menu
New attack campaign against SMBs uses a botnet to deliver PoS malware

New attack campaign against SMBs uses a botnet to deliver PoS malware

A group of attackers uses the Gorynych botnet to deploy point-of-sale malware and steal payment card data

A group of sophisticated attackers are repurposing penetration testing tools to break into the networks of small and medium-size businesses worldwide with the goal of infecting point-of-sale systems with malware.

The new attack campaign started in September and has been dubbed operation Black Atlas by researchers from antivirus vendor Trend Micro. The attackers use a wide set of tools to scan the Internet and identify potential weak spots in the networks of various organizations, the researchers said.

Their toolset includes port scanners, brute-force password guessing tools, SMTP (Simple Mail Transfer Protocol) scanners, remote desktop viewers and other attack applications that are easy to find on the Internet.

"Networks with weak password practices are likely to fall victim to this initial penetration testing stage," the Trend Micro researchers said in a blog post.

If the attackers manage to break in, they use additional malware and tools to move laterally across the network and compromise PoS systems. While doing this, they steal various credentials along the way, including email and Facebook passwords.

Once they have access to a PoS system, the attackers install a so-called memory scraping program. These are malware applications that scan the system's RAM for payment card details that are passed from the card reader to the retail software.

The Trend Micro researchers have seen the Black Atlas attackers using multiple PoS malware programs including Alina, NewPOSThings and BlackPOS. The latter was also used in the 2013 attack against Target that resulted in the compromise of around 40 million payment card details.

Because BlackPOS does not have an online data exfiltration method and instead saves the card details to a local text file, the Black Atlas attackers are combining it with a botnet-type backdoor program known as Gorynych or Diamond Fox.

"Gorynych now grabs that text file and does an HTTP POST to complete the data exfiltration," the Trend Micro researchers said. The same botnet is also used to deploy BlackPOS in the first place.

The attackers have compromised businesses around the world, including an unnamed healthcare organization in the U.S., which allowed Trend Micro to perform a deeper analysis. The most affected countries are the U.S., Australia, India, Taiwan, Germany and the U.K.


Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Featured

Slideshows

Sizing up the NZ security spectrum - Where's the channel sweet spot?

Sizing up the NZ security spectrum - Where's the channel sweet spot?

From new extortion schemes, outside threats and rising cyber attacks, the art of securing the enterprise has seldom been so complex or challenging. With distance no longer a viable defence, Kiwi businesses are fighting to stay ahead of the security curve. In total, 28 per cent of local businesses faced a cyber attack last year, with the number in New Zealand set to rise in 2017. Yet amidst the sensationalism, media headlines and ongoing high profile breaches, confusion floods the channel, as partners seek strategic methods to combat rising sophistication from attackers. In sizing up the security spectrum, this Reseller News roundtable - in association with F5 Networks, Kaspersky Lab, Tech Data, Sophos and SonicWall - assessed where the channel sweet spot is within the New Zealand channel. Photos by Maria Stefina.

Sizing up the NZ security spectrum - Where's the channel sweet spot?
Kiwi channel comes together for another round of After Hours

Kiwi channel comes together for another round of After Hours

The channel came together for another round of After Hours, with a bumper crowd of distributors, vendors and partners descending on The Jefferson in Auckland. Photos by Maria Stefina.​

Kiwi channel comes together for another round of After Hours
Show Comments