There’s a saying in show business that it takes years to become an overnight sensation. Point-of-Sale (POS) RAM Scraper Malware has arguably become the overnight sensation of cyber attacks this year. From Target and Neiman Marcus to Home Depot, PoS RAM Scraper Malware has become the malware story du jour.
It makes sense: the scope and breadth of these retail attacks, their impact on everyday people, and the fact that there’s seemingly no end in sight for these make it a compelling story. And a story that everyone needs to follow because we can all (maybe will all at some point) be affected.
Like all “overnight sensations” though, PoS RAM Scraper Malware didn’t just appear. The malware that is being used in these attacks is the result of years of development, evolution and refining.
Malware development increasingly mirrors professional software development in its rigor, methodology and sophistication. And PoS RAM Scraper Malware is no exception.
Trend Micro’s Numaan Huq has just published a comprehensive paper on PoS RAM Scraper Malware: PoS RAM Scraper Malware – Past, Present, and Future. This paper outlines the origins and evolution of PoS RAM Scraper Malware. This paper also outlines possible future developments for PoS RAM Scraper Malware and recommendations on how to protect against it.
This paper is a unique and invaluable resource for people who want to understand the current retail data breach crisis better and understand where it may go in the future. It’s also an important read for those who need to protect their retail PoS systems and are worried that their networks and systems could be next.
Check out Numaan’s paper and keep it handy for future reference. Not only is it informative for today, but it will be a valuable reference resource in the future. Because there’s no reason to think we’ve seen the last of this problem any time soon.
Please add your thoughts in the comments below or follow me on Twitter; @ChristopherBudd.