It’s Christmas also for criminals who have found a new gift under the Christmas tree, a new powerful strain of PoS malware.
According to the threat intelligence firm InfoArmor, the new PoS malware dubbed Pro PoS is available for sale in the underground forums and its authors are probably hackers from Eastern Europe.
The authors of the Pro PoS Solution designed their malware to infect the principal operating systems used by the companies in the retail industry, including newer operating systems.
According to the threat intelligence firm InfoArmor, crooks are already using the Pro PoS Solution to target PoS systems used by retailers and SMBs in the US and Canada.
Pro PoS weights just 76KB and implements rootkit features as well as mechanisms to avoid antivirus detection. The experts at InfoArmor explained that Pro PoS integrates a polymorphic engine that allows the threat to generate a different signature for each malware sample.
On November 27, experts at InfoArmor noticed a significant increase of the Pro PoS Solution price which was offered at $2,600 for a six-month licence.
The Pro PoS support TOR to hide its Command and Control (C&C) servers.
Last week experts at Said iSight Partners discovered ModPOS is new POS malware discovered in systems of US retailers after the rush of Thanksgiving, the researchers speculate it is the most complex POS malware ever seen.
Recently several hotel chains were targeted by criminal gangs, including Hilton, Starwood and Trump.
(Security Affairs – PoS Malware, Pro PoS Solution)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.