Visa Payment Fraud Disruption (PFD) observed that hackers attack point-of-sale merchants by injecting POS malware across North American fuel dispenser merchants to steal the cardholder data.
Sophisticated hackers groups breach the internal network of the POS Merchants to infect the network with POS malware, which is completely different from skimming at fuel pumps.
In a November report, VISA confirmed that malware threat actors were able to breach the network and steal the payment card data due to the lack of secure acceptance technology.
“Targeted Fuel dispenser merchants are very slow to deploy the Chip technology in their station which attracts threat actors attempting to compromise POS systems for magnetic stripe payment card data.” visa said.
With the evidence collected in the forensic report, Researchers believe that the attackers who involved in this attack attributed to the FIN8 cybercrime group.
GBHackers previously reported FIN8 group activities, and the groups are a financially motivated threat group active since at least 2016 and often targets the POS environments of the retail, restaurant, and hospitality merchants to harvest payment account data.
At the First incident, Visa investigation reveals that the attackers successfully compromised the merchant’s network through a phishing email that contained a malicious attachment.
Once the Victims open the attachment, installed a Remote Access Trojan (RAT) on the merchant network, and granted the threat actors network access which helps attackers to perform the reconnaissance the corporate network to utilize the credentials and move further into Victims POS environment.
Visa recently observed the second incident that targets another North American fuel dispenser merchant where the attackers gained the network access, but it was unclear how they gained initial access.
According to the VISA report, A RAM scraper was injected into the POS environment and was used to harvest payment card data. The targeted merchant accepted both chip transactions at the in-store terminals and magnetic stripe transactions at fuel pumps, and the malware injected into the POS environment appears to have targeted the mag stripe/track data specifically.
The third incident was targeted to the North American hospitality merchant where the attackers used FIN8-attributed malware and another new malware is a full-featured shellcode backdoor that is based on the RM3 variant of the Ursnif, a banking trojan.
With malware, no evidence indicating that it targets the fuel dispenser merchants, but the attacker will use it for future Merchants attacks.
The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS devices.…
White House National Cyber Director, CEOs, Key Financial Services Companies, Congressional and Executive Branch Experts…
Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan exploits…
The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on organizations…
Google has updated its Chrome browser, addressing critical vulnerabilities that posed potential risks to millions…
WrnRAT is a new malware attack that cybercriminals have deployed by using popular gambling games…