Vulnerabilities / Threats
1/27/2014
03:03 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

SecureState Releases Black POS Malware Scanning Tool

Black POS is the reported culprit behind recent retail data breaches

CLEVELAND, Jan. 27, 2014 /PRNewswire/ -- SecureState, a management consulting firm specializing in information security, has developed a custom scanning tool that retailers can use to detect Black POS malware, and other similar strains.

Black POS is the reported culprit behind recent retail data breaches, and is also known as KAPTOXA, a more advanced version of the original malware.

(Logo: http://photos.prnewswire.com/prnh/20130521/CL17240LOGO)

Krebs on Security recently reported that, "this type of malicious software uses a technique that parses data stored briefly in the memory banks of specific POS devices; in doing so, the malware captures the data stored on the card's magnetic stripe in the instant after it has been swiped at the terminal and is still in the system's memory."

It has also been reported that there are currently no known antivirus programs that detect the malicious files used in these attacks.

"We don't currently know if installed antivirus software on POS systems has been updated to detect this malware," Spencer McIntyre, SecureState's lead researcher said. "But, we do know that this tool will allow retailers to manually, or remotely, scan their systems for these specific strains, whether or not they have antivirus software installed."

The tool will scan for service, file, registry and autorun artifacts to determine if any KAPTOXA footprints are present on the POS system. A confidence output is generated giving the user an indication of a likely compromise.

"If the tool has detected any artifacts related to KAPTOXA immediately enact your incident response plan and contract the appropriate management and security teams," John Melvin, SecureState Lead Forensic Investigator said. "Even if the tool outputs no detection, organizations should still consider performing regular system response testing and checkups."

The tool has been tested on all MS Windows versions up to Windows 7 and is freely available for download from SecureState's website: Black POS Malware Scan

About SecureState

With the goal of making the world more secure, SecureState provides premier management consulting services for companies internationally. The SecureState team is comprised of several specialties to solve complex business problems

including: Advisory Services, Audit & Compliance, Profiling & Penetration, Privacy, Risk Management, and Incident Response.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8893
Published: 2015-01-28
Multiple cross-site scripting (XSS) vulnerabilities in (1) mainpage.jsp and (2) GetImageServlet.img in IBM TRIRIGA Application Platform 3.2.1.x, 3.3.2 before 3.3.2.3, and 3.4.1 before 3.4.1.1 allow remote authenticated users to inject arbitrary web script or HTML via a crafted URL.

CVE-2014-8894
Published: 2015-01-28
Open redirect vulnerability in IBM TRIRIGA Application Platform 3.2.1.x, 3.3.2 before 3.3.2.3, and 3.4.1 before 3.4.1.1 allows remote authenticated users to redirect users to arbitrary web sites and conduct phishing attacks via the out parameter.

CVE-2014-8895
Published: 2015-01-28
IBM TRIRIGA Application Platform 3.2.1.x, 3.3.2 before 3.3.2.3, and 3.4.1 before 3.4.1.1 allows remote attackers to bypass intended access restrictions and read the image files of arbitrary users via a crafted URL.

CVE-2014-8917
Published: 2015-01-28
Multiple cross-site scripting (XSS) vulnerabilities in (1) dojox/form/resources/uploader.swf (aka upload.swf), (2) dojox/form/resources/fileuploader.swf (aka fileupload.swf), (3) dojox/av/resources/audio.swf, and (4) dojox/av/resources/video.swf in the IBM Dojo Toolkit, as used in IBM Social Media A...

CVE-2014-8920
Published: 2015-01-28
Buffer overflow in the Data Transfer Program in IBM i Access 5770-XE1 5R4, 6.1, and 7.1 on Windows allows local users to gain privileges via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If youíre a security professional, youíve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.