{"id":3278,"date":"2017-09-14T13:43:09","date_gmt":"2017-09-14T20:43:09","guid":{"rendered":"http:\/\/sintelsystemspos.com\/?p=3278"},"modified":"2017-09-14T13:43:09","modified_gmt":"2017-09-14T20:43:09","slug":"malware-targets-pos","status":"publish","type":"post","link":"https:\/\/sintelsystemspos.com\/ru\/malware-targets-pos\/","title":{"rendered":"Malware Targets POS"},"content":{"rendered":"<p class=\"qtranxs-available-languages-message qtranxs-available-languages-message-ru\">\u0418\u0437\u0432\u0438\u043d\u0438\u0442\u0435, \u044d\u0442\u043e\u0442 \u0442\u0435\u0445\u0442 \u0434\u043e\u0441\u0442\u0443\u043f\u0435\u043d \u0442\u043e\u043b\u044c\u043a\u043e \u0432 &ldquo;<a href=\"https:\/\/sintelsystemspos.com\/en\/wp-json\/wp\/v2\/posts\/3278\" class=\"qtranxs-available-language-link qtranxs-available-language-link-en\" title=\"English\">English<\/a>&rdquo;. For the sake of viewer convenience, the content is shown below in the alternative language. You may click the link to switch the active language.<\/p><p><strong>POS Targeted by Malware<\/strong><\/p>\n<p>A new POS malware named LockPOS has been detected.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-large wp-image-15246\" src=\"https:\/\/www.sintelsystems.com\/wp\/wp-content\/uploads\/2017\/09\/POS-Security-Sintel-Systems-1024x768.png\" alt=\"POS-Security-Malware-Sintel-Systems\" width=\"625\" height=\"469\" \/><\/p>\n<p>As reported on SecurityAffairs.co,<\/p>\n<p style=\"text-align: justify;\"><em>\u201cThe malware\u2019s PoS credit card stealing functionality works similarly to other PoS malware: it scans the memory of other running programs looking for data that matches what credit card track data looks like.<\/em><\/p>\n<p style=\"text-align: justify;\">The LockPoS has been distributed via a Flokibot botnet, it is likely by the same threat actors that is focused on Brazilian users.<\/p>\n<p style=\"text-align: justify;\">The experts from Flashpoint who discovered it in the wild in December speculated that the Floki Bot has a Brazilian origin, the threat actor behind the malware was using the \u201cflokibot\u201d moniker and communicated in Portuguese. It targeted Brazilian IPs and domains and targeted systems having default language set to Portuguese.<\/p>\n<p style=\"text-align: justify;\">The Floki bot is a banking Trojan based on Zeus that has been sold on cybercrime underground since September 2016. The malware was developed starting from the Zeus source code that was leaked in 2011, it is offered for $1,000 worth of bitcoins.<\/p>\n<p><strong>Sintel Systems<\/strong><\/p>\n<p><img decoding=\"async\" class=\"alignnone size-large wp-image-15253\" src=\"https:\/\/www.sintelsystems.com\/wp\/wp-content\/uploads\/2017\/09\/Secure-Embedded-Merchant-Account-Processing-Sintel-Systems-1024x438.png\" alt=\"Secure-Embedded-Merchant-Account-Processing-Sintel-Systems\" width=\"625\" height=\"267\" \/><\/p>\n<p>Working with Sintel Systems provides peace of mind to merchants. Credit card information is never stored on our systems, protecting merchants from liability.<\/p>\n<p><em><br \/>\n<\/em>To learn more about Sintel Systems&#8217; advanced encryption and tokenization utilized by our embedded merchant account services, <a href=\"https:\/\/www.sintelsystems.com\/free-demo-quote\" target=\"_blank\" rel=\"noopener\">contact us<\/a> today.<\/p>\n<hr \/>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>\u0418\u0437\u0432\u0438\u043d\u0438\u0442\u0435, \u044d\u0442\u043e\u0442 \u0442\u0435\u0445\u0442 \u0434\u043e\u0441\u0442\u0443\u043f\u0435\u043d \u0442\u043e\u043b\u044c\u043a\u043e \u0432 &ldquo;English&rdquo;. For the sake of viewer convenience, the content is shown below in the alternative language. You may click the link to switch the active language.POS Targeted by Malware A new POS malware named LockPOS has been detected. As reported on SecurityAffairs.co, \u201cThe malware\u2019s PoS credit card stealing functionality [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-3278","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-uncategorized","7":"czr-hentry"},"_links":{"self":[{"href":"https:\/\/sintelsystemspos.com\/ru\/wp-json\/wp\/v2\/posts\/3278","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sintelsystemspos.com\/ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sintelsystemspos.com\/ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sintelsystemspos.com\/ru\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sintelsystemspos.com\/ru\/wp-json\/wp\/v2\/comments?post=3278"}],"version-history":[{"count":1,"href":"https:\/\/sintelsystemspos.com\/ru\/wp-json\/wp\/v2\/posts\/3278\/revisions"}],"predecessor-version":[{"id":3279,"href":"https:\/\/sintelsystemspos.com\/ru\/wp-json\/wp\/v2\/posts\/3278\/revisions\/3279"}],"wp:attachment":[{"href":"https:\/\/sintelsystemspos.com\/ru\/wp-json\/wp\/v2\/media?parent=3278"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sintelsystemspos.com\/ru\/wp-json\/wp\/v2\/categories?post=3278"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sintelsystemspos.com\/ru\/wp-json\/wp\/v2\/tags?post=3278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}