You searched for POS malware/ | SC Media

Your search for POS malware/ returned 20 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Cybercrime remove

Your search for POS malware/ returned 20 results

Sort Results:

Relevant Recent
Cybercrime, Malware, Retail, Security News

Researchers catch whiff of previously unknown POS sniffers and scrapers

Researchers in the last 48 hours have released a trio of reports, each of which details a newly discovered point-of-sale (POS) malware program that skims or scrapes payment card information from e-commerce websites or in-store checkout terminals. At least two of these three new threats, GMO and DMSniff, have already been observed actively attacking enterprises,…
Cybercrime, Malware, Retail, Security News

POS malware swipes payment info from Checkers and Rally’s restaurants

Just over 100 Checkers and Rally’s fast food joints and their customers were victimized by a long-running point-of-sale malware campaign that stole payment card information from purchases taking place as far back as December 2015, Checkers Drive-In Restaurants announced in an online breach notification yesterday. The Tampa, Florida-based drive-thru chain said that approximately 15 percent…
Cybercrime, Malware, Ransomware, Security News

Adversary harboring DopplePaymer ransomware targets industrial sector

A cyber adversary in possession of both ransomware and point-of-sale malware was recently found to have obtained “a deep level of access” to the infrastructures of at least two targets, including a U.S.-based aluminum and stainless steel gratings company, researchers have reported. Judging by the choice of targets, the actor has a particular interest in…
APT10
APTs/cyberespionage, Cybercrime, Security News

MuddyWater, Fin8 and Platinum threat actors back in action

Researchers have spotted the MuddyWater, Fin8 and Platinum cybergangs all making an unwanted comeback following an observed increase in malicious activity over the last few weeks. Trend Micro came across several campaigns its researchers believe contain the hallmarks of MuddyWater. But this time around the group apparently deployed a new multi-stage PowerShell-based backdoor called POWERSTATS…
ghostlyskullmobilemalware_826540
Cybercrime, Malware, Security News

FIN8 actors’ recent activity buoyed by new malware toolset: report

Researchers investigating FIN8 have shared their findings on a new reverse shell malware program that the cybercriminal group uses to establish command-and-control communications with infected machines. Additionally, they have released details on recently uncovered variants of the threat actor’s ShellTea backdoor implant and PoSlurp point-of-sale malware. FIN8 burst back on the scene last month when…
Next post in Cybercrime