2014 Cybercrime Roundup: The Year of The POS Breach
2014 Cybercrime Roundup: The Year of The POS Breach
More than any other cybercrime or fraud threat, the breach of retail chain Point of Sale
systems and the theft of credit card data from millions of shoppers was in the headlines
most in 2014. The vast majority of those breaches can be attributed to POS malware
attacks.
Despite the ease of targeting payment cards and banking information of individual users,
fraudsters are finding that compromising retailers is much more lucrative and that smaller
merchants can also be easily breached. A common attack/infection method is to leverage
the POS vendor’s remote access connection (via RDP/VNC) to run routine maintenance on
the device. Most of the POS malware attackers enumerate running processes and use
pattern matching (mostly RegEx) to identify and extract payment card information from
the running process memory.
FRAUD REPORT
Featured POS Malware include:
Chewbacca – a private Trojan featuring two distinct data-stealing mechanisms: a generic
keylogger and a memory scanner designed to specifically target POS systems. Identified as
a possible agent of the enormous scale POS system breaches that hit retail chains in 2014.
Backoff POS – features a keylogger, memory scraper, and magnetic Track1/Track2
harvester, with added support for integrated keyboard magnetic card readers.
LusyPOS – features a magnetic Track1/Track2 harvester that communicates over the TOR
network, making the communications and the C&C servers harder to detect.
Mobile BOT APK – In May, an update to an Android mobile application package (APK) was
discovered to be a malware bot application. The app disguised as a token generator for
mobile online customers of an Eastern European bank. New features include SQLite table
for stolen data saved on the victim’s phone.
Figure 3: Example of fake token
generator mobile app
R S A M O N T H LY F R A U D R E P O R T page 2
THE UNDERGROUND MARKETPLACE DEVELOPS
The underground marketplace is continuing to develop, allowing fraudsters to outsource
services with increasing ease. The RSA Research Team has identified notable trends over
the year: the emergence of forum specific currencies (MUSD, UAPS, United Payment
System); a new, anonymous payment system knows as LessPay; a supply and demand
that is not only driving down the cost of credentials, but also bringing about the advent
of a CC store mobile app.
Financial Data Aggregators – the RSA Research Team reported on fraudsters who use
legitimate financial data aggregation (personal money management) services to gain
insight into a potential victim’s financial profile and balance, as well as their online
transaction behavior patterns.
R S A M O N T H LY F R A U D R E P O R T page 3
DECEMBER 2014
Source: RSA Research Team
46,747
November. Based on this figure, RSA
estimates phishing cost global
organizations $453 million in losses. Attacks
Credit Unions
Regional
National
8% UK
4% India
R S A M O N T H LY F R A U D R E P O R T page 4
Top Hosting Countries
48%
US hosted 48% of phishing attacks in
December, followed by UK, Germany and
China. 7% 5% 3%
CONTACT US
To learn more about how RSA products, services, and solutions help solve your
business and IT challenges contact your local representative or authorized reseller –
or visit us at www.emc.com/rsa
©2015 EMC Corporation. EMC, RSA, the RSA logo, and FraudAction are trademarks or registered trademarks of EMC
Corporation in the U.S. and/or other countries. All other trademarks mentioned are the property of their respective
www.emc.com/rsa holders. JAN RPT 0115