Security News > 2022 > October > Cybercriminals Used Two PoS Malware to Steal Details of Over 167,000 Credit Cards
Two point-of-sale malware variants have been put to use by a threat actor to steal information related to more than 167,000 credit cards from payment terminals.
While a significant proportion of attacks aimed at gathering payment data rely on JavaScript sniffers stealthily inserted on e-commerce websites, PoS malware continues to be an ongoing, if less popular, threat.
"Almost all POS malware strains have a similar card dump extraction functionality, but different methods for maintaining persistence on infected devices, data exfiltration and processing," researchers Nikolay Shelekhov and Said Khamchiev said.
Group-IB, which identified the command-and-control servers, associated with the two PoS malware, said 77,428 and 90,024 unique payment records were compromised by MajikPOS and Treasure Hunter between February and September 2022.
"PoS malware has become less attractive for threat actors in recent years due to some of its limitations and the security measures implemented within the card payment industry," the researchers said.
"Nevertheless, it remains a significant threat to the payment industry as a whole and to separate businesses that have not yet implemented the latest security practices. It is too early to write off PoS malware."
News URL
https://thehackernews.com/2022/10/cybercriminals-used-two-pos-malware-to.html
Related news
- Cybercriminals Use Excel Exploit to Spread Fileless Remcos RAT Malware (source)
- NodeStealer Malware Targets Facebook Ad Accounts, Harvesting Credit Card Data (source)
- Cybercriminals used a gaming engine to create undetectable malware loader (source)
- Cybercriminals Exploit Popular Game Engine Godot to Distribute Cross-Platform Malware (source)