Newly uncovered malware uses DNS requests to siphon credit card data

Researchers have discovered new malware that relies on a unique way to steal credit card information from point-of-sale systems. In a blog post published on Thursday, Forepoint says its found malware that uses Domain Name System (DNS) requests in order to extract credit card information. That sets it apart from most other POS malware, which would normally use HTTP requests to exfiltrate data. Luke Somerville, head of special investigations for Forcepoint Labs, says companies would normally look for unusual activity in their HTTP requests in order to detect data theft. Somerville says the malware, which it is dubbing “UDPoS”, hasn’t affected any of Forcepoint’s customers, but that “there may well be people out there who we’re not protecting who may have been affected by this.” He added that Forcepoint was able to prove that the malware could successfully steal credit card data. “They’re kind of just sneaking the data out […]

The post Newly uncovered malware uses DNS requests to siphon credit card data appeared first on Cyberscoop.

Continue reading Newly uncovered malware uses DNS requests to siphon credit card data

LogMeIn acquires chatbot and AI startup Nanorep for up to $50M

 LogMeIn, the company that provides authentication and other connectivity solutions for those who connect remotely to networks and services, has made another acquisition to expand the products it offers to customers, specifically in its new Bold36… Continue reading LogMeIn acquires chatbot and AI startup Nanorep for up to $50M

Poorly crafted LogMeIn password reset email looks phishy, but isn’t

LogMeIn has been sending out password reset emails to some of its customers, to prevent account hijacking fuelled by the recent spate of massive login credential leaks. Unfortunately, their own legitimate email looks too much like a phishing message that many customers began reporting them as such to the company: As SANS ISC handler Rob VandenBrink pointed out in the above image, two of the links included in the message look “phishy”, indeed. “The blog … More Continue reading Poorly crafted LogMeIn password reset email looks phishy, but isn’t