New malware goes directly to US ATMs and cash registers for card info

March 29, 2013

While many consumers already take precautions when shopping online, they may need to start being even more careful - as a new report shows malware is focusing on physical registers and ATMs compromised by attackers looking to harvest card data.

Research conducted by the Russian-based security company Group-IB recently discovered malware called “Dump Memory Grabber,” which it believes has already been used to steal debit and credit card information from customers using major US banks including Chase, Citibank and Capital One, Security Weekly reports.

The malicious code is evidently being installed directly into point-of-sale (POS) hardware (meaning registers or kiosks) and ATMs, and transmitting the harvested information straight out of the magnetic stripes on credit and debit cards - which includes everything from account numbers, to first and last names and expiration dates.

And just how are attackers infecting physical systems? Security researchers point to USB drives as the likely culprits, as modern register systems often have accessible ports, as well as direct connections to the Web.

According to Security Weekly, the harvested information can then be used to produce cloned cards, and they are likely succeeding with the help of individuals with direct access to the POS systems and ATMs - which could include employees.

Group-IB analyzed a video evidently posted by the coder behind Dump Memory Grabber, which includes stolen card numbers, and suggests he (or perhaps she) goes by the name “Wagner Richard,” and is likely inside Russia.

This is of course not the first time that attacks have been directed at physical machines like registers or bank ATMs, though using malware is a stealthier approach than physical “skimmer” ploys, which involve mouldings placed on top of the ATM card slots and keypads that log information from unsuspecting customers.

Researchers with Group-IB believe that Dump Memory Grabber is likely part of a larger cyber-crime gang, a Russian-offshoot of the amorphous Anonymous community, and include members in Ukraine and Armenia. In addition to this latest malware, the group is allegedly also for hire to carry out DDoS attacks.

http://rt.com/usa/malware-card-info-cash-027/

Views: 116

Comment

You need to be a member of United Truth Seekers to add comments!

Join United Truth Seekers

Rocks2Rings

Help Pay The Rent. "United Truth Seekers" Is an informative Social Network exposing the truth that the mainstream media ignores. The truth will set you free!

This website is brought to you exclusively by member donations. Click Above, Thank you.

About

Eastern Standard Time

We’re “mining” cryptocurrency with our phones! I’m looking for people who want to join me and my friends and figured this would be a good way to get the word out. 🚀 I am sending you 1π! Pi is a new digital currency developed by Stanford PhDs, with over 10 million members worldwide. To claim your Pi, follow this link https://minepi.com/PAMUTS and use my username PAMUTS as your invitation code.

Download this and you will get cryptocurrency mining on your phone, and remember every 24 hours to open the app and touch the Pi button that way it automatically starts mining for you, you basically have to do nothing after that just let it Stay in the background mining cryptocurrency for you until one day it’s worth money for enough to cash it out!

~~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~~~~~

DEMAND THE TRUTH!

"It was the poverty caused by the bad influence of the
 English Bankers on the Parliament which has caused in the colonies hatred of the English and...the Revolutionary War."
– Benjamin Franklin

"Guard with jealous attention the public liberty. Suspect every one who approaches that jewel. Unfortunately, nothing will preserve it but downright force. Whenever you give up that force, you are ruined."

Patrick Henry
June 26, 1788

 

© 2024   Created by Pam Vredenburg.   Powered by

Badges  |  Report an Issue  |  Terms of Service

google-site-verification: google4dc7c778a884c7b9.html