Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Cybercriminals Use Angler Exploit Kit to Target PoS Systems

Cybercriminals have been using the Angler exploit kit to identify and infect point-of-sale (PoS) systems.

Cybercriminals have been using the Angler exploit kit to identify and infect point-of-sale (PoS) systems.

According to Trend Micro, the attackers are using Angler to deliver a reconnaissance Trojan detected by the security firm as TROJ_RECOLOAD.A. Once it infects a device, this piece of malware downloads additional threats depending on what type of payment systems it finds.

In the attacks observed by researchers, the Angler campaign involves malvertising and exploits for two recently patched Adobe Flash Player vulnerabilities. The exploit kit uses its fileless installation feature to write TROJ_RECOLOAD.A into the device’s memory instead of its hard drive where it can be detected more easily.

After it’s deployed on a computer, TROJ_RECOLOAD.A checks for the presence of virtualization, sandbox and analysis tool modules, it checks the name of the current user to see if it’s related to malware analysis, and scans running processes in search of applications such as Wireshark, Dumpcap, TCPView, and OllyDbg. If there is any indication that it’s being analyzed, the malware doesn’t execute its main routine.

If the presence of malware analysis tools is not detected, the Trojan checks the infected system to determine which of three payloads to drop.

In the first case, the threat checks the system’s URL cache for PoS-related URLs. In the second case, it uses the “net view” command to determine if the computers on the infected network have names like “POS,” “STORE,” “SHOP” or “SALE.” If none of these conditions are met, the malware drops its default payload.

Trend Micro has not been able to determine which payload is dropped in each of these cases because the command and control (C&C) servers used by the malware have been inaccessible.

Researchers only managed to obtain the payload for the scenario where the malware finds PoS-related URLs in the URL cache. In this case, the Trojan drops TROJ_RECOLOAD.B, a less stealthy version of the threat that injects itself into the explorer.exe process and checks for the presence of processes associated with Internet Explorer, Firefox and Chrome.

Advertisement. Scroll to continue reading.

Experts believe the malware could be looking for the presence of web browsers because it’s targeting web-based terminals.

Trend Micro has noted that the malware is also downloaded if TROJ_RECOLOAD.A finds the string “Verifone” in a certain registry. Verifone is an electronic payment and PoS solutions provider.

“Using exploit kits can be seen as an ingenious way of distributing PoS malware. Like using a botnet, exploit kits widens the net cast by cybercriminals for potential victims. Of course, using a compromised site or malvertisements wouldn’t necessarily guarantee that a PoS system will be caught—which is where the filtering comes in,” Trend Micro threat response engineer Anthony Joe Melgarejo explained in a blog post.

Earlier this month, Trend Micro reported that cybercriminals had started using the Andromeda botnet to deliver a new PoS malware dubbed GamaPOS.

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.

Malware & Threats

Cisco is warning of a zero-day vulnerability in Cisco ASA and FTD that can be exploited remotely, without authentication, in brute force attacks.