Vulnerabilities / Threats

2/8/2018
06:15 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

New POS Malware Steals Data via DNS Traffic

UDPoS is disguised to appear like a LogMeIn service pack, Forcepoint says.

Researchers at Forcepoint have discovered new point-of-sale (POS) malware disguised as a LogMeIn service pack that is designed to steal data from the magnetic stripe on the back of payment cards.

The malware, which Forcepoint is calling UDPoS, is somewhat different from the usual POS tools in that it uses UDP-based DNS traffic to sneak stolen credit and debit card data past firewalls and other security controls. It is also one of the few new POS malware tools to surface in some time, according to the company.

In recent years, the US, like many other countries, has switched from magnetic cards to chip and PIN cards based on the Europay, Mastercard, and Visa (EMV) standard. The transition has made it harder for criminals to steal payment card data using POS malware—like they did with the massive theft at Target in 2013.

However, malware like UDPoS suggests that criminals still see an opportunity to steal data from POS systems. For instance, Trend Micro last year reported on MajikPOS, a POS malware family that was used to steal data on more than 23,300 payment cards. Retailer Forever 21, which is investigating a data breach first reported last November, recently disclosed finding malware on some of its POS systems.

Luke Somerville, head of special investigations at Forcepoint, says there's no evidence to show that UDPoS is currently being used to steal credit or debit card data. But Forcepoint's tests have shown that the malware is indeed capable of doing so successfully.

In addition, one of the command and control servers with which the malware communicates was active and responsive during Forcepoint's investigation of the threat. "[This] implies that the authors were at least prepared to deploy this malware in the wild," Somerville says.

Among the likely targets of the malware are POS systems in hotels and restaurants and any other location with handheld devices for swiping credit and debit cards.

"This malware targets Windows-based systems," Somerville notes. "Legacy POS systems are often based on variations of the Windows XP kernel. Large retailers who have not recently updated their systems could potentially have hundreds or even thousands of vulnerable machines."

Forcepoint discovered the malware when investigating an apparent LogMeIn service pack that was generating a notable amount of unusual DNS requests. The company's analysis of the malware showed it contacting a command and control server that also had a LogMeIn-themed identity.

There is no evidence that LogMeIn's remote access service or products have been abused in any way as part of the malware deployment process, says Somerville. Instead, the authors of UDPoS appear to be simply using the LogMeIn brand as a sort of camouflage. "Using the name of a legitimate product as the theme of the file and service names is effectively an attempt to limit suspicion over the presence of these artifacts on infected machines," he says.

Forcepoint itself has no insight into the process that the malware authors have used or plan to use to deliver UDPoS on point-of-sale systems. But the use of the LogMeIn brand to disguise the malware is not accidental. Many retailers and other organizations use LogMeIn's software to enable remote management of their POS systems.

Given the filenames that have been chosen, it is clear that the authors of the malware are hoping to sneak their malware into these systems in the guise of a LogMeIn software update, Somerville says.

LogMeIn itself issued an alert this week warning its users not to fall for the scam. "According to our investigation, the malware is intended to deceive an unsuspecting user into executing a malicious email, link or file, possibly containing the LogMeIn name," the company noted.

The alert reminded organizations of the LogMeIn's policy of never using an attachment or a link for updating its software.

"UDPoS appears to have drawn inspiration from several other POS malware families," Somerville says. "While none of the individual features are entirely unique, the combination of them appears to be a deliberate attempt to draw together successful elements of other campaigns."

Related content:

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
Mueller Probe Yields Hacking Indictments for 12 Russian Military Officers
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/13/2018
10 Ways to Protect Protocols That Aren't DNS
Curtis Franklin Jr., Senior Editor at Dark Reading,  7/16/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2016-10727
PUBLISHED: 2018-07-20
camel/providers/imapx/camel-imapx-server.c in the IMAPx component in GNOME evolution-data-server before 3.21.2 proceeds with cleartext data containing a password if the client wishes to use STARTTLS but the server will not use STARTTLS, which makes it easier for remote attackers to obtain sensitive ...
CVE-2018-8018
PUBLISHED: 2018-07-20
Apache Ignite 2.5 and earlier serialization mechanism does not have a list of classes allowed for serialization/deserialization, which makes it possible to run arbitrary code when 3-rd party vulnerable classes are present in Ignite classpath. The vulnerability can be exploited if the one sends a spe...
CVE-2018-14415
PUBLISHED: 2018-07-20
An issue was discovered in idreamsoft iCMS before 7.0.10. XSS exists via the fourth and fifth input elements on the admincp.php?app=prop&do=add screen.
CVE-2018-14418
PUBLISHED: 2018-07-20
In Msvod Cms v10, SQL Injection exists via an images/lists?cid= URI.
CVE-2018-14419
PUBLISHED: 2018-07-20
MetInfo 6.0.0 allows XSS via a modified name of the navigation bar on the home page.