Security Experts:

Connect with us

Hi, what are you looking for?


Malware & Threats

Andromeda Botnet Used to Deliver New GamaPoS Malware

Researchers at Trend Micro have conducted an analysis of GamaPoS, a new point-of-sale (PoS) malware that has made its way onto the systems of United States organizations with the aid of the notorious Andromeda botnet.

Researchers at Trend Micro have conducted an analysis of GamaPoS, a new point-of-sale (PoS) malware that has made its way onto the systems of United States organizations with the aid of the notorious Andromeda botnet.

The Andromeda botnet has a wide reach, which is why many cybercriminals rely on it for distributing malware. In the campaign involving GamaPoS, experts determined that the PoS malware is downloaded on only 3.8 percent of systems affected by Andromeda.

PoS malware is designed to steal payment card data from PoS systems. Since most of the devices infected with Andromeda backdoors are not running any PoS software, it appears that the attackers behind GamaPoS are hoping to catch at least some PoS systems in the large volume of compromised computers.

According to Trend Micro, GamaPoS attacks start with emails containing macro-based malware or links pointing to exploit kits. PsExec and Mimikatz, publicly available tools that are highly popular among cybercriminals, are then dropped onto targeted computers and used by the attackers to collect information from the infected device and to move laterally in the victim’s network. The GamaPoS malware is dropped only on some of the Andromeda bots.

Researchers have spotted GamaPoS victims in 13 U.S. states, including Arizona, California, Colorado, Florida, Georgia, Illinois, Kansas, Minnesota, Nevada, New York, South Carolina, Texas, and Wisconsin. Some infected systems have also been identified in Canada and other countries.

The list of victims identified by Trend Micro includes a credit union, a pet care company, a theatre, a furniture wholesale firm, online stores, a consumer electronics company, a records storage facility, an employment agency, a restaurant, software developers, and an industrial supply distributor.

Once it successfully infects a system, GamaPoS scans all processes in search for Track 2 data associated with Visa, Discover, Maestro and other debit cards. Collected credit and debit card data is stored in a text file and uploaded to the attacker’s’ server.

Unlike many other PoS threats, GamaPoS does not use the Luhn algorithm to validate payment card data. Instead, the malware filters the data by checking the first few numbers of the scraped data to see if they match targeted cards.

An interesting aspect of GamaPoS is that it’s developed in Microsoft’s .NET platform. Trend Micro says this is the first PoS threat created using .NET.

“We can attribute this development to the fact that it is easier to create malware in the .NET platform and, now that Microsoft made it available as an open-source platform, more developers are expected to use it for their applications. This makes .NET a viable platform to use for attacks,” Jay Yaneza, Trend Micro threats analyst and author of a report on GamaPoS, explained in a blog post.

Trend Micro believes GamaPoS is closely linked to NitlovePOS, a threat analyzed in May by FireEye. In both campaigns the attackers use spam and macro-based malware for distribution, and the initial stages of the attack involve the same IP block.

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Malware & Threats

Threat actors are increasingly abusing Microsoft OneNote documents to deliver malware in both targeted and spray-and-pray campaigns.

Malware & Threats

A vulnerability affecting IBM’s Aspera Faspex file transfer solution, tracked as CVE-2022-47986, has been exploited in attacks.

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.


More than 3,800 servers around the world have been compromised in recent ESXiArgs ransomware attacks, which also include an improved process.