Tuesday, October 8, 2024
HomeCyber Security NewsUpgraded TrickBot Malware Attack Point-of-Sale Machines & Services to Steal Credit/Debit card...

Upgraded TrickBot Malware Attack Point-of-Sale Machines & Services to Steal Credit/Debit card Data

Published on

Trickbot, a Banking Trojan that involved various cyber attacks especially target the banking networks, now distributing to target the POS services and machines to steal credit cards and ATM cards bank related sensitive data.

Recently TrickBot’s malicious activities on various browsers and apps such as  Microsoft Outlook, Chrome, Firefox, IE, Edge to Steal Password & Other Sensitive Data.

Also, malware authors keeps added new futures including powerful code injection technique to evade the detection, anti-analysis technique and disable the security tools that run in the target victims computer.

- Advertisement - EHA

Currently identified the version of Trickbot scanning for indicators of the network that provide POS related services.

A new POS infection module, psfin32 is similar to network domain harvesting module that it was used in previous attacks.

Researchers discovered POS-related terms in the module and it uses LDAP queries to access Active Directory Services (ADS) to Identifying the POS services in a network.

LDAP queries & TrickBot Infection Process

LDAP queries mainly used for searching machines that containing the Following substrings related to POS in the Global Catalog.

*POS* *LANE* *BOH* *TERM**REG* *STORE* *ALOHA* *CASH* *RETAIL* *MICROS*

It using the different LDAP queries to search the substrings and if the query does not resolve any of the requested information, it also performs other queries for different accounts or objects .

Once the Trickbot obtain the information from the target then it stored the data in pre configured file and share it into C&C server ia POST connection.

if suppose C&C server not reachable then it prompt “Dpost servers unavailable,” else it respond as  “Report successfully sent.”

According to Trend Micro Research, “Considering the module’s timing for deployment, the threat actors may be leveraging the holidays to gather information and distribution, especially after a similar entry by Brad Duncan published in ISC talked about a malspam campaign involving TrickBot macros targeting the United States.”

In this case, users and businesses are warned against opening suspicious emails, files and attachments to prevent such attacks in the future.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can check the Vulnerability Management Analysis to keep your self-updated.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hackers Gained Unauthorized Network Access to Casio Networks

Casio Computer Co., Ltd. has confirmed that a third party illegally accessed its network...

Open-Source Scanner Released to Detect CUPS Vulnerability

A new open-source scanner has been released to detect a critical vulnerability in the...

Comcast Cyber Attack Impacts 237,000+ Users Personal Data

Comcast Cable Communications LLC has reported that over 237,000 users' data has been compromised....

American Water Works Cyber Attack Impacts IT Systems

American Water Works Company, Inc., a leading provider of water and wastewater services, announced...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Hackers Gained Unauthorized Network Access to Casio Networks

Casio Computer Co., Ltd. has confirmed that a third party illegally accessed its network...

Open-Source Scanner Released to Detect CUPS Vulnerability

A new open-source scanner has been released to detect a critical vulnerability in the...

Comcast Cyber Attack Impacts 237,000+ Users Personal Data

Comcast Cable Communications LLC has reported that over 237,000 users' data has been compromised....