Feeds

Dexter malware targets point of sale systems worldwide

Payment cards plundered in 40 countries

Securing Web Applications Made Simple and Scalable

You could be getting more than you bargained for when you swipe your credit card this holiday shopping season, thanks to new malware that can skim credit card info from compromised point-of-sale (POS) systems.

First spotted by security firm Seculert, the malware dubbed "Dexter" is believed to have infected hundreds of POS systems in 40 countries worldwide in recent months. Companies targeted include retailers, hotel chains, restaurants, and private parking providers.

The US, the UK, and Canada top the list of countries where the malicious app has been found, accounting for 30 per cent, 19 per cent, and 9 per cent of the total number of affected systems, respectively.

This certainly isn't the first time cybercrooks have targeted POS systems. In fact, such attacks are becoming increasingly common – which is no surprise, given how lucrative they can be.

In September, four Romanian hackers pled guilty to charges that they hacked into the POS systems of 150 Subway sandwich shops in the US. Their scheme reportedly lasted two years, during which time they were able to make off with more than $10m in fraudulent charges and funds transfers from stolen payment cards.

What sets Dexter apart from earlier incidents, however, is its relative sophistication.

Most hacks targeting POS systems – the Romanian job included – are essentially spyware attacks in which crooks use Remote Desktop exploits or other means to grab screenshots of the affected systems. In essence, the thieves are simply reading credit card information off the POS screens.

Dexter, on the other hand, uses a more subtle approach – and a more thorough one. Once the malware is installed on a POS system, it grabs the machine's list of active processes and sends them to a command-and-control server – a highly unusual step for POS malware, according to security researchers at Trustwave.

If the server determines that any of the programs currently running on the machine correspond to known POS software, it orders Dexter to dump the memory of those processes, parse them for payment card–related data, and upload that data to the server, so that criminals can use it to clone the cards.

That much we know. What isn't known is just how Dexter finds its way onto POS terminals to begin with. According to Seculert, about 30 per cent of the POS systems targeted were running Windows Server, which makes it unlikely that the malware was installed using typical social-engineering or drive-by web download methods.

Still, if you do encounter unrecognized charges on your credit card bill in the coming months, now you know what to tell the bank when you call to dispute the transactions: "It wasn't me. It was that POS system that swiped my card!" ®

Mobile application security vulnerability report

More from The Register

next story
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
NIST told to grow a pair and kick NSA to the curb
Lrn2crypto, oversight panel tells US govt's algorithm bods
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.