Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

New PoS Trojan Steals Card Data, Intercepts Browser Requests

18/09/2015 by Sharon Shahzad

W1siziisijiwmtuvmdkvmtgvmtqvntgvntqvodi4l3bvcybzzwn1cml0es5qcgvnil0swyjwiiwidgh1bwiilci2mdb4ndawxhuwmdnlil1d

Researchers from anti-virus firm Dr.Web have discovered new malware designed to infect point-of-sale (PoS) terminals and capable of intercepting GET and POST requests sent from Web browsers on infected machines.

Dubbed Trojan.MWZLesson, the Trojan can modify the registry branch in charge with autorun on the infected PoS terminals, while also being able to check the device’s RAM for credit card information, the security firm said.

All of the acquired bankcard data along with intercepted communication, including GET and POST requests, is sent to the command and control server. However, the malware is also capable of executing a series of commands, which makes it even more dangerous.

Dr.Web explains in a blog post that the commands supported by the Trojan include CMD (forward the command to the interpreter - cmd.exe), UPDATE, FIND (search for documents using a mask), DDoS (mount an HTTP Flood attack), and rate (set a time interval for communication with the command and control server).

Additionally, Trojan.MWZLesson supports a LOADER command, which allows it to download and run a file (dll—using the regsrv tool, vbs—using the wscript tool, exe—run directly), and communicates with the server over the HTTP protocol. Packages sent by the malware are not encrypted, but the server ignores any package that does not include a special cookie parameter.

According to Dr.Web researchers, the Trojan borrows code from previously discovered Dexter malware that targets PoS terminals, while its architecture looks similar to that of Neutrino, though it is rather a downsized version of the latter.

The Trojan can also steal data from the Microsoft Mail application, as well as FTP login credentials, the experts said. 

This article has been extracted from http://www.securityweek.com, please click on this link to read the article in full http://www.securityweek.com/new-pos-trojan-steals-card-data-intercepts-browser-requests

Montash is a multi-award winning global technology recruitment business. Specialising in permanent and contract positions across mid-senior appointments across a wide range of industry sectors and IT functions, including:

ERP Recruitment, BI & Data Recruitment, Information Security Recruitment, Enterprise Architecture & Strategy Recruitment , Energy Technology Recruitment, Demand IT and Business Engagement Recruitment, Digital and E-commerce Recruitment, Leadership Talent, Infrastructure and Service Delivery Recruitment, Project and Programme Delivery Recruitment.

Montash is headquartered in Old Street, London, in the heart of the technology hub. Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid-management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtyvmtivmdyvmdkvmjcvmtavnze4l2nsb3vkihrly2hub2xvz3kgc2vydmljzxmuanbnil0swyjwiiwidgh1bwiilcizodb4mtawiyjdxq

AI continues to infiltrate cloud computing se...

2016-12-06 09:00:00 +0000

With Google and Microsoft both already working on artificial intelligence (AI) software for their cloud services, it has been revealed that Amazon is now to join the battle. The internet giant is to prioritise developing AI for Amazon Web Services (AWS), the division that sells data storage and computing to IT professionals around the world. AWS is currently the fastest-growing division for Amazon, with the past year having seen sales soar by 60 per cen...

W1siziisijiwmtyvmtivmduvmtqvmdavmjivmzm1l0jpzybeyxrhlmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Big data analytics – governed data discovery ...

2016-12-05 13:00:00 +0000

Big data analytics has matured as a business process during 2016 with most enterprises now recognising the critical importance of actively mining big data for insights. These insights will inform decision-making and ensure they remain competitive in an increasingly complex landscape that is constantly in flux. One prediction that will certainly come to fruition in the coming years is “more data”. The world’s storage systems are set to hold more than 17....