Trojan hits hotel payment apps

Powered by SC Magazine
 

Criminal underground peddles sub-$300 spyware installer.

Security researchers have discovered a trojan being sold on black market websites as a way to steal customer credit card information from hotels.

According to security firm Trusteer, the remote access trojan was being peddled in underground forums for $US280 ($A270).

The malware targets hotels' front-desk computers. Once installed, it downloads spyware that captures screenshots from point-of-sale (PoS) applications to sniff out credit card numbers and expiration dates.

Trojan sellers have also included guidance on how to use social engineering to trick front-desk clerks into installing the trojan.

Oren Kedem, director of product marketing at Trusteer, said the hospitality industry was a lucrative target because it dealt in valuable financial data.

Fraudsters may also find hotels soft targets because employees regularly received emails from unknown people, and could be tricked into opening malware-laden messages, he said.

"Hotels communicate with the public," he said. "If you're a hotel you open emails and communicate with people you don't know on a regular basis."

Kedem added that hotel employees often used unmanaged mobile devices that may not contain patches and anti-virus protections to stop new trojans.

Verizon Business' Data Breach Investigation Report has highlighted the hospitality and retail sector as a prime target of data thieves in recent years.

The report this year included data from the Australian Federal Police and highlighted an increase in automated attacks against PoS systems of small hospitality and retail businesses.

Copyright © SC Magazine, US edition


Trojan hits hotel payment apps
 
 
 
Top Stories
How hard do you hack back?
[Blog post] Taking the offensive could have unintended consequences.
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
The big winners from Defence’s back-office IT refresh
Updated: The full list of subcontractors.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1023

Vote