Card Data, Keystrokes Quickly Exfiltrated by FastPOS Malware

  • 3 June 2016
  • 1 reply
  • 172 views

Userlevel 7
Badge +54
By Eduard Kovacs on June 03, 2016
 
Trend Micro researchers have come across a new point-of-sale (PoS) malware family that has been described as quick and efficient when it comes to exfiltrating harvested data.

The malware, dubbed FastPOS, has been observed infecting both SMBs and enterprises in countries like the United States, France, Brazil, Hong Kong, Japan and Taiwan. The threat is usually installed via compromised websites, a file sharing service, or via VNC access using stolen credentials or brute-force attacks.

FastPOS is designed to collect payment card data by scraping the infected device’s memory and log keystrokes. Unlike other PoS malware families, FastPOS sends the harvested data immediately back to its command and control (C&C) server instead of storing it locally and uploading it at certain intervals.
 
Full Article

1 reply

Userlevel 7
This is not good news at all, and it seems to be widespread and spreading even further. I really wonder why it is that manufacturers cannot make resilient PoS systems. :(

Reply