Monday, November 25, 2024
HomeComputer SecurityVISA Warning that Hackers Injecting POS Malware in Fuel Dispenser Merchants...

VISA Warning that Hackers Injecting POS Malware in Fuel Dispenser Merchants To Steal Payment Card Data

Published on

Visa Payment Fraud Disruption (PFD) observed that hackers attack point-of-sale merchants by injecting POS malware across North American fuel dispenser merchants to steal the cardholder data.

Sophisticated hackers groups breach the internal network of the POS Merchants to infect the network with POS malware, which is completely different from skimming at fuel pumps.

In a November report, VISA confirmed that malware threat actors were able to breach the network and steal the payment card data due to the lack of secure acceptance technology.

- Advertisement - SIEM as a Service

“Targeted Fuel dispenser merchants are very slow to deploy the Chip technology in their station which attracts threat actors attempting to compromise POS systems for magnetic stripe payment card data.” visa said.

With the evidence collected in the forensic report, Researchers believe that the attackers who involved in this attack attributed to the FIN8 cybercrime group.

GBHackers previously reported FIN8 group activities, and the groups are a financially motivated threat group active since at least 2016 and often targets the POS environments of the retail, restaurant, and hospitality merchants to harvest payment account data.

Different Incidents were observed

At the First incident, Visa investigation reveals that the attackers successfully compromised the merchant’s network through a phishing email that contained a malicious attachment.

Once the Victims open the attachment, installed a Remote Access Trojan (RAT) on the merchant network, and granted the threat actors network access which helps attackers to perform the reconnaissance the corporate network to utilize the credentials and move further into Victims POS environment.

Visa recently observed the second incident that targets another North American fuel dispenser merchant where the attackers gained the network access, but it was unclear how they gained initial access.

According to the VISA report, A RAM scraper was injected into the POS environment and was used to harvest payment card data. The targeted merchant accepted both chip transactions at the in-store terminals and magnetic stripe transactions at fuel pumps, and the malware injected into the POS environment appears to have targeted the mag stripe/track data specifically.

The third incident was targeted to the North American hospitality merchant where the attackers used FIN8-attributed malware and another new malware is a full-featured shellcode backdoor that is based on the RM3 variant of the Ursnif, a banking trojan.

With malware, no evidence indicating that it targets the fuel dispenser merchants, but the attacker will use it for future Merchants attacks.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Veritas Enterprise Vault Vulnerabilities Lets Attackers Execute Arbitrary Code Remotely

Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and...

7-Zip RCE Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip,...

Massive Credit Card Leak, Database of 1,221,551 Cards Circulating on Dark Web

A massive data breach has sent shockwaves across the globe, as a database containing...

Nearest Neighbor Attacks: Russian APT Hack The Target By Exploiting Nearby Wi-Fi Networks

Recent research has revealed that a Russian advanced persistent threat (APT) group, tracked as...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Massive Credit Card Leak, Database of 1,221,551 Cards Circulating on Dark Web

A massive data breach has sent shockwaves across the globe, as a database containing...

Russian TAG-110 Hacked 60+ Users With HTML Loaded & Python Backdoor

The Russian threat group TAG-110, linked to BlueDelta (APT28), is actively targeting organizations in...

Earth Kasha Upgraded Their Arsenal With New Tactics To Attack Organizations

Earth Kasha, a threat actor linked to APT10, has expanded its targeting scope to...