December 12, 2016 By Douglas Bonderud 2 min read

A new banking malware is being sold on several Dark Web markets as a way to grab point-of-sale (POS) data. According to Threatpost, the hot new Floki Bot is based on the Zeus 2.0.8.9 source code.

In many ways, it surpasses its predecessor in terms of scope and severity. Researchers have now observed the bot in action across U.S., Canadian and Brazilian banks and insurance firms. Is the little bot with the funny name the internet’s new financial nightmare?

Life of the POS Party

Cybercriminals targeting POS data isn’t anything new. As noted by SC Magazine, there was a 400 percent uptick in POS malware across the U.S. during Thanksgiving weekend, with both NewPOSthings and the ever-popular ZeusPOS making appearances.

While security teams anticipated a boost in predatory POS behavior from Black Friday through Cyber Monday, researchers from security firm Proofpoint noted that “the spikes were dramatic.” In other words, cybercriminals are now doubling down when it comes to high-traffic shopping days, and why not when there’s simply so much POS data to grab?

Floki Bot is one of the newer variants on the scene. According to security expert Dr. Peter Stephenson, this bot has been gaining ground since September when it started appearing in Dark Web marketplaces. Floki’s author has been talking up its capabilities, claiming it can escape deep packet inspection and read track 2 credit card data. The malware also boasts a 70 percent execution rate over Zeus’ 30 percent clip.

While some of these talking points may be more marketing hype than measurable results, Stephenson did find Floki harder than average to track down during a deep packet inspection. Floki is now being used by at least 10 cybercriminal gangs who can buy it for $1,000 on Alphabay or other Dark Web sites. At its prime, Zeus went for $15,000 and was used by just five cybergangs. Floki Bot may be the new life of the POS party.

Floki Bot Is No Fluke

As noted by Infosecurity Magazine, Floki Bot doesn’t just repurpose the Zeus code leaked back in 2011, but actually makes a number of improvements. For example, the author added hooking methods to grab credit card track data from memory, making it more versatile than most other banking Trojans.

It’s using a combination of targeted spear phishing campaigns and the RIG exploit kit to infect banks and insurance firms across the U.S., Canada and Brazil. That’s a much bolder move than its progenitor, which preferred subtlety and specificity over generalized attacks.

It’s also worth noting that the malware is adaptable and aggressive. Once executed, it attempts to infect explorer.exe. If that fails, it opts for svchost.exe, while simultaneously hashing every stage of its process to obfuscate actions and confound security teams.

Additionally, there’s dormant Tor code in the new bot that appears to be a work in progress since security researchers couldn’t get it to activate. That could make the POS malware even more frustrating if both origin and destination IPs are covered by Tor’s anonymity.

While the name doesn’t exactly inspire fear, this up-and-coming piece of Zeus-inspired malware is proving to be quite the POS problem. It could turn into a nightmare with enough backers and a boost to its latent Tor code.

More from

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

Research finds 56% increase in active ransomware groups

4 min read - Any good news is welcomed when evaluating cyber crime trends year-over-year. Over the last two years, IBM’s Threat Index Reports have provided some minor reprieve in this area by showing a gradual decline in the prevalence of ransomware attacks — now accounting for only 17% of all cybersecurity incidents compared to 21% in 2021. Unfortunately, it’s too early to know if this trendline will continue. A recent report released by Searchlight Cyber shows that there has been a 56% increase in…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today