TechHive: Malware that struck Target has familiar roots, researchers say

TechHive
TechHive helps you find your tech sweet spot. We guide you to products you'll love and show you how to get the most out of them. 
Your small business full-time assistant

Join the 500,000+ people using Shoeboxed to streamline accounting and bookkeeping. Turn a pile of receipts into digital data to save time, money and hassle.
From our sponsors
thumbnail Malware that struck Target has familiar roots, researchers say
Jan 19th 2014, 14:30, by Jaikumar Vijayan

A security company that worked with the U.S. Secret Service to investigate the data breach at Target identified the malware used in the attack as a sophisticated derivative of a previously known Trojan program designed to steal data from Point-of-Sale (POS) systems.

In a report released late last week, iSight Partners identified the tool as Trojan.POSRAM, which it described as software that can find, store, and transmit credit card and PIN numbers from POS systems.

The Trojan is being used in a "persistent, wide ranging, and sophisticated" cyber campaign dubbed KAPTOXA targeting "many operators" of POS systems, the company warned. Some affected companies may not yet know they've been compromised or have already lost data, the iSight report noted. It did not mention Target as the company that was investigated.

Tiffany Jones, the author of the report, described the POSRAM Trojan as a customized version of BlackPOS, a piece of malware that has been available in the cyber underground since at least last February.

To read this article in full or to leave a comment, please click here

You are receiving this email because you subscribed to this feed at blogtrottr.com.

If you no longer wish to receive these emails, you can unsubscribe from this feed, or manage all your subscriptions
Previous
Next Post »