Backoff POS malware spreading
Posted by: Timothy Weaver on 10/24/2014 12:51 PM
[
Comments
]

Once installed, the malware scrapes PoS system's memory for "track data," installs keyloggers, returns findings to a centralized command server and installs a supplemental backdoor.
A high rate of return is possible for the hackers as PoS systems set up on a local network are easy targets for the attackers. They can gain access and remain hidden for long periods of time without being caught.
Network security firm Damballa detected a 57 percent rise in infected devices in August, and that number grew another 27 percent last month.
Comments