28 May 2015
Your browser is unable to support Flash files.

'ChewBacca' POS malware uncovered in the wild

31 January 2014  |  4619 views  |  1 ChewBacca malware

RSA researchers have uncovered a new point-of-sale malware operation emanating from Eastern Europe that has succeeded in scraping payment card data from small retailers in 11 countries.

While most of the infection activity has occurred in the US, the malware - dubbed ChewBacca - has also been spotted in the wild in in 10 other countries including Russia, Canada and Australia. RSA researchers discovered that, beginning 25 October, Chewbacca had logged track 1 and 2 data of almost 50,000 payment cards it had scraped from infected PoS systems.

RSA says it has been in contact with victim companies and the FBI to shut down the command-and-control server logging the data and to share key forensics data.

The ChewBacca Trojan featured simple keylogging and memory-scraping functionality to search for regular expressions of card mag-stripe data. If a card number is found, it is extracted and logged by the server.

RSA's findings come as US retailer Target said that the recent breach of its POS platform that lifted details of over 100 million cardholders may have occurred through the use of a vendor's stolen credentials. Two other major US retailers - Neiman Marcus and Michaels - have also seen their POS systems attacked using similar malware engineering techniques.

Target may be on the receiving end of $1 billion in breach fines levied by the Payment Card Industry Security Standard Council, according to an analyst note from Jefferies.

"Retailers have a few choices against these attackers," says Yotam Gottesman, a senior security researcher at RSA's FirstWatch team. "They can increase staffing levels and develop leading-edge capabilities to detect and stop attackers via comprehensive monitoring and incident response, or they can encrypt or tokenize data at the point of capture and ensure that it is not in plaintext view on their networks, thereby shifting the risk and burden of protection to the card issuers and their payment processors."
KeywordsEFTPOS

Comments: (1)

A Finextra member | 31 January, 2014, 10:43

So card issuers and payment processors have to be PCI compliant but retailers and their POS providers don't?

Be the first to give this comment the thumbs up 0 thumb ups! (Log in to thumb up)
Comment on this story (membership required)
Log in to receive notifications when someone posts a comment

Finextra news in your inbox

For Finextra's free daily newsletter, breaking news flashes and weekly jobs board, sign up now.

Related blogs

Create a blog about this story (membership required)

Related stories

27 January, 2014
21 January, 2014
20 January, 2014
16 January, 2014
14 January, 2014
10 January, 2014
19 December, 2013

Related company news

 

Top topics

Most viewed Most shared
UK opts out of European online payments se...
7686 views comments | 22 tweets | 17 linkedin
Bigger banks may have to set up their own...
6500 views comments | 41 tweets | 34 linkedin
Postbank trials HCE mobile payments
4696 views comments | 9 tweets | 9 linkedin
JPMorgan Chase puts data to use with new t...
4686 views comments | 16 tweets | 7 linkedin
Visa Europe opens innovation hub in Israel
4272 views comments | 17 tweets | 9 linkedin

Featured job

c.£70-100K base, commission + equity
London, UK

Find your next job