Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Attack on European PoS Vendor Linked to PoSeidon Malware Operation: RSA

The PoSeidon malware may not be God of the ocean of cyber-threats in the wild, but it is linked to a recent attack detected against a popular point-of-sale vendor (PoS) in Europe, researchers said. 

The PoSeidon malware may not be God of the ocean of cyber-threats in the wild, but it is linked to a recent attack detected against a popular point-of-sale vendor (PoS) in Europe, researchers said. 

According to EMC’s RSA security division, a malicious email sent to infect the PoS vendor has a number of technical ties to the PoSeidon operation. PoSeidon was publicly identified by Cisco Systems back in March. According to Cisco, the malware scrapes memory in order to find number sequences that match up with formats used by Visa, MasterCard, AMEX and Discover, and uses the Luhn algorithm to verify whether credit or debit card numbers are valid.

“PoSeidon was professionally written to be quick and evasive with new capabilities not seen in other PoS malware,” members of Cisco’s Security Solutions team blogged. “PoSeidon can communicate directly with C&C servers, self-update to execute new code and has self-protection mechanisms guarding against reverse engineering.”

In the attack reported by RSA, the email in question was sent using a domain resembling one legitimately registered by a restaurant in New York City. The email contained a Word document that dropped the Vawtrak banking Trojan.

“The recipient email address was associated with an Exchange distribution email list of a popular POS vendor in Europe,” blogged RSA’s Kent Backman. “The recipient email address could be found using an Internet search engine.  We do not know if this exploitation campaign was successful.”

“The spoof domain was registered using the email address SILLITOEXPYA(at)RAMBLER.RU,” he continued, adding that the email address had been used to register 40 other domains, many of which link to multiple malware campaigns. Three of the domains were highlighted by Cisco’s Talos threat intelligence team in its investigation of PoSeidon.

Several samples of malware called out to the domains also used by PoSeidon, he noted.

“It is possible that the merchant being spoofed could be a customer of the targeted POS vendor,” blogged Backman. “We do not know if the domain and crafted email was created as “one-off” infrastructure specifically to target the European POS vendor, or multiple vendors.  However, we do know that the mail exchange (MX) record for the restaurant spoof domain stopped resolving to the IP address 31.184.192.215 shortly after the malicious attachment was processed by VirusTotal, suggesting some attempt by the actors to cover their tracks after a possibly unsuccessful exploitation campaign. The MX record could have been in place to allow two-way email interaction with victims targeted with the malware attachment.”

Advertisement. Scroll to continue reading.

The ultimate goal of the attackers may not have been to compromise the PoS vendor, he added. Instead, they may actually be trying to subvert the entire supply chain.

“The threat’s principle objective may be to establish lateral access to merchants and their point of sales systems: the source of payment card info,” he explained.

“It should be noted,” he blogged, “that the POS vendor targeted in this campaign posted on their website more than one hundred business logos representing 82 commercial partners, 35 technological partners and 18 solution integrators. Should the compromise spread laterally to one of these, the following might be gathered: partner knowledge-base, data for social engineering campaigns, email addresses, points of contact, detailed knowledge of hardware configuration and deployment [and] network topologies and infrastructure.”

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.

Malware & Threats

Cisco is warning of a zero-day vulnerability in Cisco ASA and FTD that can be exploited remotely, without authentication, in brute force attacks.