PoS malware also targeting ticket vending machines and electronic kiosks
- 27 November, 2014 05:12
Cybercriminals are using malware designed to steal payment card information from point-of-sale systems to also infect ticket vending machines and electronic kiosks.
Security researchers from cybercrime intelligence firm IntelCrawler found a new malware program called d4re|dev1| -- hacker spelling for daredevil -- that is capable of stealing information from multiple PoS systems including QuickBooks Point of Sale Multi-Store, OSIPOS Retail Management System, Harmony WinPOS and Figure Gemini POS.
"This new strain of malware, which is hitting Mass Transit Systems, acts as an advanced backdoor with remote administration, having RAM scrapping and keylogging features," the IntelCrawler researchers said Wednesday in a blog post.
PoS malware has been directly responsible for data breaches at several large retailers over the past two years. After they infect point-of-sale terminals, these malicious programs grab payment card data from their RAM where it is temporarily stored by the specialized software that process transactions.
The number of PoS malware threats has grown considerably and the most common attack vector used to infect PoS terminals is weak remote administration credentials that can easily be guessed or brute forced by attackers.
The d4re|dev1| malware is also likely distributed in this manner, but according to IntelCrawler, the program also allows attackers to remotely upload files to an infected system. This functionality can be used to either update the malware or to install additional attack tools for lateral movement inside the local network.
"Serious cybercriminals are not interested in just one particular Point-of-Sale terminal -- they are looking for enterprise wide network environments, having tens of connected devices accepting payments and returning larger sets of spoils to their C2 [command-and-control] servers," the IntelCrawler researchers said.
While investigating PoS compromises, IntelCrawler determined that the employees of affected companies commonly violated security policies and used the terminals to check their email, surf the Web, connect to social networks and even play games.
Some investigations revealed that cybercriminals also compromised ticket vending machines used by mass transportation systems and electronic kiosks installed in public areas. One infected ticket vending machine was identified in August in Sardinia, Italy, and had been compromised through VNC (Virtual Network Computing), a remote administration protocol.
"These kiosks and ticket machines don't usually house large daily lots of money like ATMs, but many have insecure methods of remote administration allowing for infectious payloads and the exfiltration of payment data in an ongoing and undetected scheme," the IntelCrawler researchers said.