Pages

Categories

Search

 

A First Look at the Target Intrusion, Malware

by
January 16, 2014
Cyberattack
No Comment

“This type of malicious software uses a technique that parses data stored briefly in the memory banks of specific POS devices; in doing so, the malware captures the data stored on the card’s magnetic stripe in the instant after it has been swiped at the terminal and is still in the system’s memory. Armed with this information, thieves can create cloned copies of the cards and use them to shop in stores for high-priced merchandise. Earlier this month, U.S. Cert issued a detailed analysis of several common memory scraping malware variants.”

Source:A First Look at the Target Intrusion, Malware — Krebs on Security