Shoppers have undoubtedly had enough security scares after data breaches at Target and other retailers, but experts now say point-of-sale (POS) malware is becoming a hot commodity among cybercriminals.

A blog post from security firm CBTS reported that the POS malware, dubbed LusyPOS, is large in size and can potentially track credit card information and steal data from consumers as they attempt to make purchases. This is similar in nature to what happened at Target earlier this year, when personal data from thousands of customers was compromised.

According to PCWorld, LusyPOS can be purchased for as little as $2,000 and is available on black market websites that trade in credit card data and VirusTotal, a security research portal. The story suggested that whoever created the malware may have been studying Chewbacca and Dexter, which are similar forms of malicious software that have taken aim at POS terminals.

Of course, most retailers use some form of encryption to protect their customers, but these forms of POS malware use a small window of opportunity when the data is stored in a terminal’s random access memory. That lets cybercriminals scrape credit card numbers and other details, such as what happened in the Home Depot breach, which affected an estimated 56 million customers. An article on Tom’s Guide said LusyPOS is even more difficult to detect because it leverages Tor, a series of tunnels intended to make its users anonymous, when it communicates with a remote server.

Experts suggested to Help Net Security that this is a good example of how industry standards can help. For instance, retailers were asked several years ago to implement the payment card information (PCI) standards to avoid certain areas of risk. PCI audits could identify some of the potential holes (such as fishy-looking domain names or the use of Tor to connect to command-and-control systems) to avoid the worst.

Unfortunately, these threats are continuing to evolve and become more sophisticated as the holiday season gains steam. Dark Reading recently published an in-depth look at FrameworkPOS, DarkPOS and other forms of targeted attacks that could bedevil researchers. Just a few days ago, VPN Creative profiled another new entrant, GetMyPass, that could be very difficult for traditional antivirus software to detect. SC Magazine, meanwhile, reported on POS malware that is still in the beta testing phase.

The bottom line for retailers is that staying on top of cybercriminals may soon become as much of a priority as tracking their sales. As for consumers, the phrase “buyer, beware” has never seemed more appropriate.

More from

Machine Learning Applications in the Cybersecurity Space

3 min read - Machine learning is one of the hottest areas in data science. This subset of artificial intelligence allows a system to learn from data and make accurate predictions, identify anomalies or make recommendations using different techniques. Machine learning techniques extract information from vast amounts of data and transform it into valuable business knowledge. While most industries use these techniques, they are especially prominent in the finance, marketing, healthcare, retail and cybersecurity sectors. Machine learning can also address new cyber threats. There…

3 min read

HHS Releases Hospital Cyber Resiliency Landscape Analysis

4 min read - On April 17, 2023, The U.S. Department of Health and Human Services (HHS) 405(d) Program announced the release of its Hospital Cyber Resiliency Initiative Landscape Analysis. This landmark analysis reports on domestic hospitals’ current state of cybersecurity preparedness. The scope of the HHS study was limited to activities that protect access to patient care and safety and reduce the negative impact of cyber threats on clinical operations. Breaches of sensitive data were considered only if the breach had a direct…

4 min read

BlackCat (ALPHV) Ransomware Levels Up for Stealth, Speed and Exfiltration

9 min read - This blog was made possible through contributions from Kat Metrick, Kevin Henson, Agnes Ramos-Beauchamp, Thanassis Diogos, Diego Matos Martins and Joseph Spero. BlackCat ransomware, which was among the top ransomware families observed by IBM Security X-Force in 2022, according to the 2023 X-Force Threat Intelligence Index, continues to wreak havoc across organizations globally this year. BlackCat (a.k.a. ALPHV) ransomware affiliates' more recent attacks include targeting organizations in the healthcare, government, education, manufacturing and hospitality sectors. Reportedly, several of these incidents resulted…

9 min read

Now Social Engineering Attackers Have AI. Do You? 

4 min read - Everybody in tech is talking about ChatGPT, the AI-based chatbot from Open AI that writes convincing prose and usable code. The trouble is malicious cyber attackers can use generative AI tools like ChatGPT to craft convincing prose and usable code just like everybody else. How does this powerful new category of tools affect the ability of criminals to launch cyberattacks, including social engineering attacks? When Every Social Engineering Attack Uses Perfect English ChatGPT is a public tool based on a…

4 min read