A new strain of point-of-sale malware, LusyPOS, has arrived in underground black markets just in time for the holiday season.

According to a report by Tom’s Guide, the going rate for LusyPOS, which is similar to the malware used in the Target attack last year, is $2,000. 

Called a cross between Chewbacca and Dexter in a Security Kitten blog post by Cincinnati, Ohio-based CTBS reverse engineers Nick Hoffman and Jeremy Humble, after the malware infects a retail POS machine it scrapes payment card data while it is held in RAM and before it is encrypted.

Like Chewbacca, LusyPOS uses the Tor network, which offers the cover of anonymity, to transmit the information to a remote server, where the miscreants can retrieve it.