Thursday, May 28, 2015

Attackers use email spam to infect point-of-sale terminals with new malware


Cyber ​​criminals are targeting employees who browse the Web or check their email from point-of-sale (PoS) computers, a risky but unfortunately common practice.
Researchers from security firm FireEye recently came across a spam campaign that used rogue email messages masquerading as job inquiries.
The emails HAD Fake resumes Attached That Were Actually Word Documents with an Embedded Malicious Macro. If Allowed to Run, The Macro Installed A Program That Downloaded Additional malware from A Remote Server.
Among those Additional Programs, The FireEye Researchers  Identified A new Memory-scraping malware Threat That Steals PAYMENT Card Data from PoS Terminals. They've dubbed The new Threat NitlovePOS.
PoS malware HAS Become commonplace over The past FEW years and HAS LED to Some of The Largest Credit Card breaches to date. This Kind of Malicious Program WAS Used to Steal 56 Million PAYMENT Card Records from Home Depot last year and 40 Million from Target in Late 2013.
Once they are installed on PoS terminals, these programs scan the system's memory for card data while it's being passed from the card reader to the specialized merchant application-hence the term "memory-scraping." Criminals can use the stolen data to create fraudulent copies of the compromised cards.
Attackers typically Infect PoS Systems with malware by Using Stolen Or Easy-to-guess Remote Access credentials. Another method Is First to Compromise on Other Computers The SAMe as The Network Terminals and Then to Attack Them.



Organizations should educate their employees to follow best security practices, such as using POS systems for what they are intended for and not to browse the web, check email, play video games, etc., 

No comments:

Post a Comment