Uncategorized

VISA Warning that Hackers Injecting POS Malware in Fuel Dispenser Merchants To Steal Payment Card Data

Visa Payment Fraud Disruption (PFD) observed that hackers attack point-of-sale merchants by injecting POS malware across North American fuel dispenser merchants to steal the cardholder data.

Sophisticated hackers groups breach the internal network of the POS Merchants to infect the network with POS malware, which is completely different from skimming at fuel pumps.

In a November report, VISA confirmed that malware threat actors were able to breach the network and steal the payment card data due to the lack of secure acceptance technology.

“Targeted Fuel dispenser merchants are very slow to deploy the Chip technology in their station which attracts threat actors attempting to compromise POS systems for magnetic stripe payment card data.” visa said.

With the evidence collected in the forensic report, Researchers believe that the attackers who involved in this attack attributed to the FIN8 cybercrime group.

GBHackers previously reported FIN8 group activities, and the groups are a financially motivated threat group active since at least 2016 and often targets the POS environments of the retail, restaurant, and hospitality merchants to harvest payment account data.

Different Incidents were observed

At the First incident, Visa investigation reveals that the attackers successfully compromised the merchant’s network through a phishing email that contained a malicious attachment.

Once the Victims open the attachment, installed a Remote Access Trojan (RAT) on the merchant network, and granted the threat actors network access which helps attackers to perform the reconnaissance the corporate network to utilize the credentials and move further into Victims POS environment.

Visa recently observed the second incident that targets another North American fuel dispenser merchant where the attackers gained the network access, but it was unclear how they gained initial access.

According to the VISA report, A RAM scraper was injected into the POS environment and was used to harvest payment card data. The targeted merchant accepted both chip transactions at the in-store terminals and magnetic stripe transactions at fuel pumps, and the malware injected into the POS environment appears to have targeted the mag stripe/track data specifically.

The third incident was targeted to the North American hospitality merchant where the attackers used FIN8-attributed malware and another new malware is a full-featured shellcode backdoor that is based on the RM3 variant of the Ursnif, a banking trojan.

With malware, no evidence indicating that it targets the fuel dispenser merchants, but the attacker will use it for future Merchants attacks.

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Nearest Neighbor Attacks: Russian APT Hack The Target By Exploiting Nearby Wi-Fi Networks

Recent research has revealed that a Russian advanced persistent threat (APT) group, tracked as "GruesomeLarch"…

2 days ago

240+ Domains Used By PhaaS Platform ONNX Seized by Microsoft

Microsoft's Digital Crimes Unit (DCU) has disrupted a significant phishing-as-a-service (PhaaS) operation run by Egypt-based…

2 days ago

Russian TAG-110 Hacked 60+ Users With HTML Loaded & Python Backdoor

The Russian threat group TAG-110, linked to BlueDelta (APT28), is actively targeting organizations in Central…

2 days ago

Earth Kasha Upgraded Their Arsenal With New Tactics To Attack Organizations

Earth Kasha, a threat actor linked to APT10, has expanded its targeting scope to India,…

2 days ago

Raspberry Robin Employs TOR Network For C2 Servers Communication

Raspberry Robin, a stealthy malware discovered in 2021, leverages advanced obfuscation techniques to evade detection…

2 days ago

145,000 ICS Systems, Thousands of HMIs Exposed to Cyber Attacks

Critical infrastructure, the lifeblood of modern society, is under increasing threat as a new report…

3 days ago