Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    POS Malware Tool Emerges to Exploit Retailers

    Written by

    Sean Michael Kerner
    Published December 17, 2015
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Point-of-sale (POS) malware has been a concern for retailers for several years now, especially following the Target breach in late 2013. POS malware is evolving further with the emergence of the Pro POS tool, according to a new report from Cisco’s Talos research team.

      Pro POS is designed to be a professional tool for enabling an attacker to exploit point-of-sale systems.

      Earl Carter, security research engineer at Cisco Talos, noted that Cisco worked with one of its intelligence partners to obtain the software from underground Dark Web forums. While Pro POS is having an impact on consumers and retail organizations, it’s not clear how many organizations might be infected and already exploited by the tool.

      “Cisco does not disclose specific customer data or information, but we can discuss the types of threats that certain industries have faced,” Carter told eWEEK. “We continue to see hackers target retailers, restaurants and hotels with POS malware.”

      As consumers travel and spend more money during the holiday season, Cisco anticipates an uptick in POS malware, Carter said. Other research groups, including Trustwave SpiderLabs, have also been reporting on the emergence of new forms of POS malware in recent weeks.

      As is the case with most POS malware, Pro POS targets Microsoft’s Windows operating system. Pro POS works on standard versions of Windows XP and contains a rootkit specifically targeting Windows versions, from XP to Windows 7, Carter said.

      “The memory scraping technique used by Pro POS continues to work in the newer versions of Windows, thanks to Microsoft’s efforts to maintain backward compatibility,” Carter explained. “The increased security for drivers in newer versions of Windows would prevent the rootkit from being installed, and the user may be prompted with a UAC [user account control] popup when first executing Pro POS, but the malware can impact POS terminals on a wide array of Windows versions.”

      While Pro POS provides a slick graphical user interface, the core malware code is based on the Alina malware family. Alina is not open-source code though the code has been widely leaked in underground forums.

      “The fact that the source code of Alina was leaked makes it incredibly easy to change strings or code segments that AV [antivirus] vendors have signature on,” Carter said.

      Carter added that there are other things that Pro POS does in order to avoid being detected by AV technologies, including modifying compiler options, which can also drastically affect the structure of malware, potentially breaking AV signatures. The Pro POS malware also uses a packer to obfuscate its contents, adding another layer of complexity.

      “The shallowness of changes to the source code certainly improves the odds of detection with existing signatures, but it is difficult to predict which AV signatures of Alina characteristics were not altered between each of the variants,” Carter said.

      While Pro POS bills itself as a professional tool for POS exploitation, an attacker still needs to figure out how to get the malware onto a vulnerable system in the first place. That said, Carter noted that compromising a system can be accomplished by exploiting a vulnerability, guessing the password or even tricking the user into running a file.

      In the United States, retailers are now embracing EMV chip-and-PIN credit cards, which provide an additional layer of security. Carter explained that Pro POS targets magnetic stripe credit cards only; however, EMV cards still have magnetic stripes that store payment data.

      “As long as retailers continue to accept swiping of the credit card versus using the EMV chips, threat actors will likely continue to target them with easily deployed malware like Pro POS,” Carter said.

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×