Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT

New Malware Shows Marketing Polish

A new strain of point-of-sale malware skims credit card numbers and comes via a highly polished marketing campaign.

Malware is constantly evolving and, according to a new blog post from Cisco Talos, so is malware marketing. The point-of-sale (PoS) malware being sold, called GlitchPOS, isn't particularly advanced, but its packaging and marketing are — and those advanced techniques promise new troubles for security professionals working in retail and hospitality fields.

In the blog post, researchers detail how they found the malware on a crimewave forum and rapidly discovered that it comes complete with video instructions on its use and a modular format that makes putting it in the field quite easy.

How easy is it to deploy? "I would say it's about the sophistication of installing a video game," says Craig Williams, director of outreach at Cisco Talos. As a consequence, "My concern is that you're going to see younger and younger cybercriminals with kits like these. It's just getting easier and easier," he explains.

The growing sophistication of GlitchPOS is similar to that found in the marketing and support of Cayosin, malware with a sophisticated sales infrastructure that was discovered by researchers at Perch in February. In that case, Perch senior threat researcher Paul Scott pointed out that the malware's author "… has got 127 posts, he's got 1,382 followers and he's following 306 accounts." The Cayosin author offered individual support through direct messages as well as video and photo support showing how to create attacks on his network.

GlitchPOS's author, identified as edbitss by researchers at Cisco Talos and Check Point, claims authorship of the DiamondFox L!NK botnet in 2015/2016 and 2017, according to the Cisco Talos blog post. Williams says that while DiamondFox L!NK was sophisticated, "The author has polished this" and improved both the malware and its marketing.

Although the malware is being marketed globally, Williams says that the victims are likely to be concentrated in the US because credit cards are still being issued with magnetic strips and some stores have delayed moving their PoS equipment to chip readers. "The cards still have mag stripes, so if they're still swiping, they're vulnerable," Williams says.

Researchers note that GlitchPOS is being spread through malicious email campaigns, in messages that include a fake game featuring a cute cat. In order to protect themselves, merchants should have a fully updated anti-malware system in place and watch for suspicious email. As for consumers, there's little they can realistically do beyond avoiding credit card swiping terminals. "If swiping your card is the only option, pay cash," Williams recommends.

Related content:

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Unreasonable Security Best Practices vs. Good Risk Management
Jack Freund, Director, Risk Science at RiskLens,  11/13/2019
6 Small-Business Password Managers
Curtis Franklin Jr., Senior Editor at Dark Reading,  11/8/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18980
PUBLISHED: 2019-11-14
On Signify Philips Taolight Smart Wi-Fi Wiz Connected LED Bulb 9290022656 devices, an unprotected API lets remote users control the bulb's operation. Anyone can turn the bulb on or off, or change its color or brightness remotely. There is no authentication or encryption to use the control API. The o...
CVE-2019-17391
PUBLISHED: 2019-11-14
An issue was discovered in the Espressif ESP32 mask ROM code 2016-06-08 0 through 2. Lack of anti-glitch mitigations in the first stage bootloader of the ESP32 chip allows an attacker (with physical access to the device) to read the contents of read-protected eFuses, such as flash encryption and sec...
CVE-2019-18651
PUBLISHED: 2019-11-14
A cross-site request forgery (CSRF) vulnerability in 3xLogic Infinias Access Control through 6.6.9586.0 allows remote attackers to execute malicious and unauthorized actions (e.g., delete application users) by sending a crafted HTML document to a user that the website trusts. The user needs to have ...
CVE-2019-18978
PUBLISHED: 2019-11-14
An issue was discovered in the rack-cors (aka Rack CORS Middleware) gem before 1.0.4 for Ruby. It allows ../ directory traversal to access private resources because resource matching does not ensure that pathnames are in a canonical format.
CVE-2019-14678
PUBLISHED: 2019-11-14
SAS XML Mapper 9.45 has an XML External Entity (XXE) vulnerability that can be leveraged by malicious attackers in multiple ways. Examples are Local File Reading, Out Of Band File Exfiltration, Server Side Request Forgery, and/or Potential Denial of Service attacks. This vulnerability also affects t...