Kasidet POS RAM Scraper Malware
Kasidet POS Malware is a variant of Point of Sale (POS) Malware that performs DDoS attacks using Namecoin's Dot-Bit service to scrape payment card details.[1][2] It is also known as Trojan.MWZLesson or Neutrino and was found in September 2015 by cyber security experts.[3][4] It is a combination of BackDoor.Neutrino.50 and the POS malware.[5]
Operation
Kasidet POS Worm gets on a system along with the other malware or gets downloaded unknowingly when user visits malicious websites.[6][7] This malware is different from other POS malware and it scrapes data with advanced features.[8] First it scrapes the POS RAM and steals payment card details. Then the scraped information is sent to the cyber criminal with intercepted GET and POST requests from the browser.[9] It's very difficult to detect this bot by using security programs; sometimes it's detectable in email spam campaigns and exploit kits.[10] The scraping capability of Kasidet has now been enhanced by the cyber criminals and it now hides C&C server in the Namecoin DNS Service Dot-Bit.
Incidents
- The US Government blamed Russian hackers for malicious Kasidet POS malware found in Democratic National Committee computers and a Burlington Electric Company laptop.[11][12][13] In the former case, the software was allegedly used to interfere in the 2016 election.
- Zscaler has reported that MS Office documents distributed in phishing emails contain macros that install Kasidet POS malware into user machines.[7][14] The malware is believed to originate in Russia.[14]
See also
- Cyber electronic warfare
- Cyber security standards
- Cyber warfare
- List of cyber attack threat trends
- Proactive Cyber Defence
- Point-of-sale malware
- Point of sale
References
- ↑ "What is Kasidet Malware?". http://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=Win32/Kasidet.
- ↑ "Kasidet uses Namecoin's Dot-Bit service to hide C&C servers". http://news.softpedia.com/news/kasidet-pos-credit-card-scraper-hides-c-c-servers-on-namecoin-s-blockchain-506988.shtml.
- ↑ "Kasidet POS RAM Scraper Bot". https://securebox.comodo.com/blog/pos-security/kasidet-pos-ram-scraper-bot-now-hides-cc-servers-namecoins-dot-bit-service/.
- ↑ "Major Botnet Malware". https://www.eset.com/int/about/newsroom/research/eset-helps-to-disrupt-dorkbot-major-botnet-malware/.
- ↑ "Backdoor Neutrino Malware". http://www.darkreading.com/endpoint/macro-malware-resurgence-highlighted-by-kasidet-outbreak/d/d-id/1324144.
- ↑ "Kasidet Neutrino Malware Operation". https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/bkdr_kasidet.fd.
- ↑ 7.0 7.1 "Malicious Office Files Dropping Kasidet And Dridex". https://www.zscaler.com/blogs/research/malicious-office-files-dropping-kasidet-and-dridex.
- ↑ "ATTACKERS DROPPING KASIDET BOT with Advanced Features". https://threatpost.com/attackers-dropping-kasidet-bot-via-office-macros/116090/.
- ↑ "C&C Servers Add Third 'C' With New Concealment Tools". https://securityintelligence.com/news/cc-servers-add-third-c-with-new-concealment-tools/.
- ↑ "Kasidet DDOSing Bot Adds Credit Card Scraping Capabilities". http://news.softpedia.com/news/kasidet-ddosing-bot-adds-credit-card-scraping-capabilities-492802.shtml.
- ↑ "Vermont utility finds alleged Russian malware on computer". http://edition.cnn.com/2016/12/30/us/grizzly-steppe-malware-burlington-electric/.
- ↑ "RUSSIANS PENETRATED BURLINGTON ELECTRIC DEPARTMENT COMPUTER". https://vtdigger.org/2016/12/30/russians-penetrated-computer-burlington-electric-dept/.
- ↑ "The Russians are Hacking Burlington_Electric_Department laptop". http://opensources.info/us-power-grid-the-russians-are-hacking-or-not/.
- ↑ 14.0 14.1 "MS Office files delivering malware". https://www.enterprisetimes.co.uk/2016/02/01/ms-office-files-delivering-malware/.