Feeds

Dexter malware targets point of sale systems worldwide

Payment cards plundered in 40 countries

The essential guide to IT transformation

You could be getting more than you bargained for when you swipe your credit card this holiday shopping season, thanks to new malware that can skim credit card info from compromised point-of-sale (POS) systems.

First spotted by security firm Seculert, the malware dubbed "Dexter" is believed to have infected hundreds of POS systems in 40 countries worldwide in recent months. Companies targeted include retailers, hotel chains, restaurants, and private parking providers.

The US, the UK, and Canada top the list of countries where the malicious app has been found, accounting for 30 per cent, 19 per cent, and 9 per cent of the total number of affected systems, respectively.

This certainly isn't the first time cybercrooks have targeted POS systems. In fact, such attacks are becoming increasingly common – which is no surprise, given how lucrative they can be.

In September, four Romanian hackers pled guilty to charges that they hacked into the POS systems of 150 Subway sandwich shops in the US. Their scheme reportedly lasted two years, during which time they were able to make off with more than $10m in fraudulent charges and funds transfers from stolen payment cards.

What sets Dexter apart from earlier incidents, however, is its relative sophistication.

Most hacks targeting POS systems – the Romanian job included – are essentially spyware attacks in which crooks use Remote Desktop exploits or other means to grab screenshots of the affected systems. In essence, the thieves are simply reading credit card information off the POS screens.

Dexter, on the other hand, uses a more subtle approach – and a more thorough one. Once the malware is installed on a POS system, it grabs the machine's list of active processes and sends them to a command-and-control server – a highly unusual step for POS malware, according to security researchers at Trustwave.

If the server determines that any of the programs currently running on the machine correspond to known POS software, it orders Dexter to dump the memory of those processes, parse them for payment card–related data, and upload that data to the server, so that criminals can use it to clone the cards.

That much we know. What isn't known is just how Dexter finds its way onto POS terminals to begin with. According to Seculert, about 30 per cent of the POS systems targeted were running Windows Server, which makes it unlikely that the malware was installed using typical social-engineering or drive-by web download methods.

Still, if you do encounter unrecognized charges on your credit card bill in the coming months, now you know what to tell the bank when you call to dispute the transactions: "It wasn't me. It was that POS system that swiped my card!" ®

Next gen security for virtualised datacentres

More from The Register

next story
Ice cream headache as black hat hacks sack Dairy Queen
I scream, you scream, we all scream 'DATA BREACH'!
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
Three quarters of South Korea popped in online gaming raids
Records used to plunder game items, sold off to low lifes
Oz fed police in PDF redaction SNAFU
Give us your metadata, we'll publish your data
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?