August 11, 2016 By Larry Loeb 2 min read

Security firm PandaLabs has been watching point-of-sale (POS) malware for some time. It talked earlier this year about PunkeyPOS, a malware that affected POS terminals at hundreds of restaurants. But it didn’t give up the fight after that; it kept watching for Punkey.

A New POS Malware

PandaLabs discovered more details about the criminal group behind the malware and how it operates. The firm recently announced on its official website that the group actually uses valid LogMeIn user credentials meant for accounts used on computers running POS software and connected to POS terminals.

LogMeIn can be thought of as a tool similar to TeamViewer. It allows users to log in and manage remote devices. In a POS systems, LogMeIn can be used by the same business that provides the systems to restaurants to perform updates, maintenance and the like.

Softpedia noted that the attackers did not use a zero-day vulnerability in LogMeIn; they simply took advantage of weak login credentials or deduced the credentials through other means. Panda advised customers to consult the user manual for best practices regarding protecting accounts.

About POSCardStealer

While observing a PunkeyPOS attack on terminals, the researchers noticed another POS malware conducting its own evil machinations during that attack. They called the new malware POSCardStealer. They found that this threat would only try to load if LogMeIn was present on the POS system.

According to the researchers, the attackers first connected to the POS using LogMeIn. Then, they downloaded an executable using the program, which then executes a script. Fourteen hours later, an isolated attack installed a new version of the Multigrain malware in one POS terminal, Softpedia reported.

Just 30 minutes after that, the attack automatically replicated itself and infected hundreds of victim machines in only 10 minutes.

Bars and Restaurants, Beware

The variant of POSCardStealer the security firm found was compiled in Visual C++. Panda said the malware samples were created specifically to attack those POS victims.

POSCardStealer was used on at least 30 POS systems. The malware’s infection routine included specific support for Dinerware, which is a POS system deployed at bars and restaurants, and POSitouch, which is also catered to the food and service industry.

This kind of POS malware can only have bad consequences, especially when it flies under the radar of security professionals trying to keep their customers’ payment information secure.

More from

Hive0137 and AI-supplemented malware distribution

12 min read - IBM X-Force tracks dozens of threat actor groups. One group in particular, tracked by X-Force as Hive0137, has been a highly active malware distributor since at least October 2023. Nominated by X-Force as having the “Most Complex Infection Chain” in a campaign in 2023, Hive0137 campaigns deliver DarkGate, NetSupport, T34-Loader and Pikabot malware payloads, some of which are likely used for initial access in ransomware attacks. The crypters used in the infection chains also suggest a close relationship with former…

Unveiling the latest banking trojan threats in LATAM

9 min read - This post was made possible through the research contributions of Amir Gendler.In our most recent research in the Latin American (LATAM) region, we at IBM Security Lab have observed a surge in campaigns linked with malicious Chrome extensions. These campaigns primarily target Latin America, with a particular emphasis on its financial institutions.In this blog post, we’ll shed light on the group responsible for disseminating this campaign. We’ll delve into the method of web injects and Man in the Browser, and…

Crisis communication: What NOT to do

4 min read - Read the 1st blog in this series, Cybersecurity crisis communication: What to doWhen an organization experiences a cyberattack, tensions are high, customers are concerned and the business is typically not operating at full capacity. Every move you make at this point makes a difference to your company’s future, and even a seemingly small mistake can cause permanent reputational damage.Because of the stress and many moving parts that are involved, businesses often fall short when it comes to communication in a crisis.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today