20 October 2014

'ChewBacca' POS malware uncovered in the wild

31 January 2014  |  4349 views  |  1 ChewBacca malware

RSA researchers have uncovered a new point-of-sale malware operation emanating from Eastern Europe that has succeeded in scraping payment card data from small retailers in 11 countries.

While most of the infection activity has occurred in the US, the malware - dubbed ChewBacca - has also been spotted in the wild in in 10 other countries including Russia, Canada and Australia. RSA researchers discovered that, beginning 25 October, Chewbacca had logged track 1 and 2 data of almost 50,000 payment cards it had scraped from infected PoS systems.

RSA says it has been in contact with victim companies and the FBI to shut down the command-and-control server logging the data and to share key forensics data.

The ChewBacca Trojan featured simple keylogging and memory-scraping functionality to search for regular expressions of card mag-stripe data. If a card number is found, it is extracted and logged by the server.

RSA's findings come as US retailer Target said that the recent breach of its POS platform that lifted details of over 100 million cardholders may have occurred through the use of a vendor's stolen credentials. Two other major US retailers - Neiman Marcus and Michaels - have also seen their POS systems attacked using similar malware engineering techniques.

Target may be on the receiving end of $1 billion in breach fines levied by the Payment Card Industry Security Standard Council, according to an analyst note from Jefferies.

"Retailers have a few choices against these attackers," says Yotam Gottesman, a senior security researcher at RSA's FirstWatch team. "They can increase staffing levels and develop leading-edge capabilities to detect and stop attackers via comprehensive monitoring and incident response, or they can encrypt or tokenize data at the point of capture and ensure that it is not in plaintext view on their networks, thereby shifting the risk and burden of protection to the card issuers and their payment processors."
KeywordsEFTPOS

Comments: (1)

A Finextra member | 31 January, 2014, 10:43

So card issuers and payment processors have to be PCI compliant but retailers and their POS providers don't?

Be the first to give this comment the thumbs up 0 thumb ups! (Log in to thumb up)
Comment on this story (membership required)
Log in to receive notifications when someone posts a comment

Finextra news in your inbox

For Finextra's free daily newsletter, breaking news flashes and weekly jobs board, sign up now.

Related blogs

Create a blog about this story (membership required)

Related stories

27 January, 2014
21 January, 2014
20 January, 2014
16 January, 2014
14 January, 2014
10 January, 2014
19 December, 2013

Related company news

 

Featured job

Find your next job