IT threat evolution Q3 2018. Statistics

These statistics are based on detection verdicts of Kaspersky Lab products received from users who consented to provide statistical data. Q3 figures According to Kaspersky Security Network: Kaspersky Lab solutions blocked 947,027,517 attacks launched from online resources located in 203… Read Full Article Continue reading IT threat evolution Q3 2018. Statistics

X-Force IRIS Identifies FIN6 Activity on POS Networks

IBM X-Force IRIS identified a cybergang known as FIN6 using the FrameworkPOS and GratefulPOS malware to harvest massive amounts of payment card data from point-of-sale (POS) systems.

The post X-Force IRIS Identifies FIN6 Activity on POS Networks appeared first on Security Intelligence.

Continue reading X-Force IRIS Identifies FIN6 Activity on POS Networks

IT threat evolution Q2 2018. Statistics

In Q2 2018, attempted infections by malware designed to steal money via online access to bank accounts were logged on the computers of 215,762 users, ransomware attacks were registered on the computers of 158,921 unique users. Continue reading IT threat evolution Q2 2018. Statistics

New POS Malware PinkKite Takes Flight

Researchers shed light on a newly discovered family of point of sale malware that is extremely small in size and adept at siphoning credit card numbers from POS endpoints. Continue reading New POS Malware PinkKite Takes Flight

New Point-of-Sale Malware Steals Credit Card Data via DNS Queries

Cybercriminals are becoming more adept, innovative, and stealthy with each passing day. They are now adopting more clandestine techniques that come with limitless attack vectors and are harder to detect.

A new strain of malware has now been discovered… Continue reading New Point-of-Sale Malware Steals Credit Card Data via DNS Queries

Newly uncovered malware uses DNS requests to siphon credit card data

Researchers have discovered new malware that relies on a unique way to steal credit card information from point-of-sale systems. In a blog post published on Thursday, Forepoint says its found malware that uses Domain Name System (DNS) requests in order to extract credit card information. That sets it apart from most other POS malware, which would normally use HTTP requests to exfiltrate data. Luke Somerville, head of special investigations for Forcepoint Labs, says companies would normally look for unusual activity in their HTTP requests in order to detect data theft. Somerville says the malware, which it is dubbing “UDPoS”, hasn’t affected any of Forcepoint’s customers, but that “there may well be people out there who we’re not protecting who may have been affected by this.” He added that Forcepoint was able to prove that the malware could successfully steal credit card data. “They’re kind of just sneaking the data out […]

The post Newly uncovered malware uses DNS requests to siphon credit card data appeared first on Cyberscoop.

Continue reading Newly uncovered malware uses DNS requests to siphon credit card data