JackPOS malware presented as a Java Update Scheduler

13:45 ET, 13 February 2014

JackPOS was detected by security experts at IntelCrawler firm several days ago and it seemed based on code from “Alina”. Attacks on POS are on the rise.

A new strain of Point-of-Sale malware named “JackPOS” was discovered by IntelCrawler, a cyber intelligence firm from Los Angeles, confirming the growing trend of Point-of-Sales malware after the Target data breach. JackPOS was detected several days ago and it seemed based on code from “Alina”.

“The bad actors are using similar tactics and methods by gathering and memory parsing of the of credit card data once inside the merchant’s system” reported the official post published by the company.

j1

j1

The cybercriminals distributed via Drive-by attack several variants of malware masked as Java (TM) Platform SE binary which then replaced the legit Java Update Scheduler file having its embedded strings in the file description.

“Some of detected samples use APC Injection from User Space using the API function QueueUserAPC to “svchost.exe”. The malware samples are pretty fresh and were created close to the beginning of February. The build path which was detected follows to “C:Usersziedpirate.ziedpirate-PCDesktopsopsopRelease”

j3

j4

j5

j6

j7

j8

The cybercriminals have written the loaders with AutoIt coding language because it is a very flexible scripting language used since 1999 in Windows environments. The language was used to perform simple operations like text file editing, but allows also the creation of more complex scripts that perform mass downloads with complex GUIs. AutoIt is an easy-to-learn language that allows for quick development,due this reason it was chosen by numerous malware author.

Malware authors used it to implement detection avoidance techniques, in particular, they have written the loader code to unpack additional binary malicious code and execute further instructions received from the C&C server.  IntelCrawler experts confirmed the existence of different attack vectors, crooks have used some sophisticated scanning, loading, and propagating techniques to get into merchants’ system thru external perimeters and then move to card processing areas, which were possibly not separated in compliance with PCI polices.

Which is the extent of the infection?

IntelCrawler  analysts have found compromised machines in numerous countries, including  Brazil, Canada, France, India, Spain, Korea, Argentina and the US. In same cases the machines were infected more than 17 days ago. The IntelCrawler’s threat intelligence team released a global map of Point-of-Sales infections based on data collected during the investigation on different malware.

j9

Pierluigi Paganini

(Editor-In-Chief, CDM)

 

rsa-logo

 

 

 

February 13, 2014

cyber defense awardsWe are in our 11th year, and Global InfoSec Awards are incredibly well received – helping build buzz, customer awareness, sales and marketing growth opportunities, investment opportunities and so much more.
Cyber Defense Awards

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X