Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    New Report Analyzes Point of Sale Malware

    Written by

    Sean Michael Kerner
    Published November 14, 2014
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Over the course of the last 12 months, there has been a relentless string of disclosures about retail data breaches, typically as a result of some form of point-of-sale (POS) malware. A new report from security vendor Cyphort analyzes some of the main culprits.

      One of the largest retail breaches of the last year involves Home Depot, which impacted 56 million credit cards and 53 million email accounts. Home Depot first confirmed it was the victim of a data breach in September, noting that the malware that hit its operations was previously unknown.

      Dr. Fengmin Gong, co-founder and chief architect at Cyphort, suspects that the malware behind the Home Depot breach is one known as FrameworkPOS, though there is reason for some doubt.

      “Cyphort does not have a sample in hand with proper chain of custody to link to Home Depot,” Gong told eWEEK. “We believe it to be FrameworkPOS based on our analyses of all POS samples we do have and other research reports in the community.”

      Gong added that it’s also possible that the malware that hit Home Depot is a variant of Backoff, given that it’s unknown from Home Depot’s perspective. The focus of Cyphort is more on the behavior of the various POS malware families than on which one was used in a particular breach, he said.

      The Backoff malware family was first publicly disclosed by the United States Secret Service in July. At least 1,000 retailers have been impacted by Backoff.

      In addition to Backoff and FrameworkPOS, Cyphort has analyzed a malware family known as BlackPOS, which the company suspects was behind the Target breach in November 2013. In the Target breach, 70 million customers were impacted, and the retailer publicly stated in August that it would be taking a $148 million charge to cover breach-related expenses.

      Across Backoff, FrameworkPOS and BlackPOS, there are a number of common characteristics. The most common characteristic is that they all include the capability to perform credit card information harvesting, using memory scraping on the POS machines, according to Gong. Beyond that, Backoff sets itself apart from FrameworkPOS and BlackPOS in many aspects of its sophistication and capability, he added.

      Security vendor Trustwave is credited by the U.S. Secret Service as helping to initially discover Backoff malware. Trustwave Lead Security Researcher Ryan Merritt explained to eWEEK that all of the POS malware families scrape running memory (RAM) to pull out credit card numbers as they are being processed. Some malware families are more specific about what they are targeting in memory, but they are all memory scrapers, he said.

      “The main functionality is quite similar. Some even argued that BlackPOS and FrameworkPOS were the same family,” Merritt said. “But the biggest differences typically are in how the malware handles maintaining its own persistence on the victim system, and if it handles the exfiltration of the compromised card data.”

      Within the POS malware families, there are now multiple variants as well. In fact, Backoff has more than 10 discovered variants at this point, according to Merritt.

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×