Tag Archive for: PointofSale

Point-of-sale data breaches have now reached the cloud

The latest in a string of hacks against retail point-of-sale systems has hit the operator of a cloud-based service with about 38,000 business clients.

Montreal-based Lightspeed reported the breach on Thursday and said it affected a system that retailers can use from tablets, smartphones and other devices.  

The incident occurs as a growing number of retailers and hotels have been targeted by hackers, who typically install malware into the point-of-sale systems to steal credit card numbers.

To read this article in full or to leave a comment, please click here

Network World Security

New point-of-sale malware Multigrain steals card data over DNS

Security researchers have found a new memory-scraping malware program that steals payment card data from point-of-sale (PoS) terminals and sends it back to attackers using the Domain Name System (DNS).

Dubbed Multigrain, the threat is part of a family of malware programs known as NewPosThings, with which it shares some code. However, this variant was designed to target specific environments.

That’s because unlike other PoS malware programs that look for card data in the memory of many processes, Multigrain targets a single process called multi.exe that’s associated with a popular back-end card authorization and PoS server. If this process is not running on the compromised machine, the infection routine exists and the malware deletes itself.

To read this article in full or to leave a comment, please click here

Network World Security

Memory scraping malware targets Oracle Micros point-of-sale customers

A new malware program designed to steal payment card details from point-of-sale (PoS) systems is targeting businesses using Oracle Micros products.

Micros, which was acquired by Oracle last year, develops front and back office customer service systems that are popular in the hospitality, food and retail industries. Its technology is used at over 330,000 customer sites in 180 countries, according to the company.

Security researchers from antivirus firm Trend Micro recently came across a highly configurable memory scraping malware program that they dubbed MalumPoS.

This kind of program monitors the memory of other processes for payment card track data—the information that’s encoded on the magnetic stripe of payment cards and which can be used to clone them.

To read this article in full or to leave a comment, please click here

Network World Security

New point-of-sale malware on underground markets for $2,000

A new kind of point-of-sale malware similar to that which struck Target is being sold in underground markets for US$ 2,000.

The malware, LusyPOS, was found on VirusTotal, a website where people can submit malware samples to see if one of several dozen security applications detects it.

It had also been advertised on an underground carding website, where people buy and sell stolen payment card data, said Brian Minick, vice president of the advanced security business of CBTS, a Cincinnati, Ohio-based security company.

“It’s the first we’ve seen of it,” Minick said. “It looks pretty new.”

Retailers across the U.S. have been hit hard by malware that scans the volatile memory of computers connected to point-of-sale systems, which handle card payments. Home Depot said it lost 56 million card details to this type of attack over a six-month period earlier this year, one of the largest data breaches on record.

To read this article in full or to leave a comment, please click here

Network World Security