• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   POS

TrickBot’s Bigger Bag of Tricks

  • Posted on:November 21, 2018 at 4:56 am
  • Posted in:Malware
  • Author:
    Trend Micro
0

TrickBot continues to evolve as it adds more features to steal users’ credentials, the most recent development we published being the pwgrab32 module. Because of TrickBot’s modular capability, we found a newly added POS malware feature that makes this banking trojan more dangerous. The new module scans for indicators if an infected computer is connected to a network that supports POS services and machines.

Read More
Tags: POSTrickbot

Operation Black Atlas, Part 2: Tools and Malware Used and How to Detect Them

  • Posted on:December 18, 2015 at 6:21 am
  • Posted in:Botnets, Malware
  • Author:
    Trend Micro Cyber Safety Solutions Team
0

This is the second part of our two-part blog series on Operation Black Atlas. The first blog entry is entitled, Operation Black Atlas Endangers In-Store Card Payments and SMBs Worldwide; Switches between BlackPOS and Other Tools. Operation Black Atlas has already spread to a multi-state healthcare provider, dental clinics, a machine manufacturer, a technology company…

Read More
Tags: BlackPOSbotnetgorynychOperation Black AtlasPOSTargeted Attack

Operation Black Atlas Endangers In-Store Card Payments and SMBs Worldwide; Switches between BlackPOS and Other Tools

  • Posted on:December 1, 2015 at 12:31 am
  • Posted in:Botnets, Malware
  • Author:
    Trend Micro Cyber Safety Solutions Team
0

With the coming holidays also come news of various credit card breaches that endanger the data of many industries and their customers. High-profile breaches, such as that of the Hilton Hotel and other similar establishments, were accomplished using point-of-sale (PoS) malware, leading many to fear digital threats on brick-and-mortar retailers this Thanksgiving, Black Friday, Cyber Monday, and the rest of the holiday season. Researchers also found a broad campaign that uses the modular ModPOS malware to steal payment card data from retailers in the US.

However, from what we have seen, it is not only retailers in the US that are at risk of breaches. Our researchers recently found an early version of a potentially powerful, adaptable, and invisible botnet that seeks out PoS systems within networks. It has already extended its reach to small and medium sized business networks all over the world, including a healthcare organization in the US. We are calling this operation Black Atlas, in reference to BlackPOS, the malware primarily used in this operation.

Read More
Tags: Botnetshealthcarepoint-of-salePOSSMB

Prototype Nation: Emerging Innovations in Cybercriminal China

  • Posted on:November 23, 2015 at 4:57 am
  • Posted in:Malware
  • Author:
    Lion Gu (Senior Threat Researcher)
0

Cybercrime doesn’t wait for anything or anyone. Two years after publishing our last report on the wares and services traded in the bustling Chinese underground, we found that the market’s operations have further expanded. From traditional malware, Chinese cybercriminals are now looking toward newer innovations and technologies to boost their operations. The Chinese underground now…

Read More
Tags: ATM skimmerblack marketChinese cybercrimeChinese undergroundCUEScybercrimecybercriminal undergroundcybercriminal underground economy seriesPOS

Moving Forward with EMV and Other Payment Technologies

  • Posted on:September 28, 2015 at 9:45 am
  • Posted in:Malware
  • Author:
    Numaan Huq (Senior Threat Researcher)
2

October 1st ushers in a significant shift for merchants, banks, and consumers. It is deadline day for merchants in the United States to switch to EMV technology. EMV stands for Europay, MasterCard, and Visa, the three companies that created the EMV consortium in 1994 to develop new technologies to counteract payment card fraud. With this…

Read More
Tags: credit carddataEMVmobile walletPOS
Page 1 of 412 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.