Trojan hits hotel payment apps

Powered by SC Magazine
 

Criminal underground peddles sub-$300 spyware installer.

Security researchers have discovered a trojan being sold on black market websites as a way to steal customer credit card information from hotels.

According to security firm Trusteer, the remote access trojan was being peddled in underground forums for $US280 ($A270).

The malware targets hotels' front-desk computers. Once installed, it downloads spyware that captures screenshots from point-of-sale (PoS) applications to sniff out credit card numbers and expiration dates.

Trojan sellers have also included guidance on how to use social engineering to trick front-desk clerks into installing the trojan.

Oren Kedem, director of product marketing at Trusteer, said the hospitality industry was a lucrative target because it dealt in valuable financial data.

Fraudsters may also find hotels soft targets because employees regularly received emails from unknown people, and could be tricked into opening malware-laden messages, he said.

"Hotels communicate with the public," he said. "If you're a hotel you open emails and communicate with people you don't know on a regular basis."

Kedem added that hotel employees often used unmanaged mobile devices that may not contain patches and anti-virus protections to stop new trojans.

Verizon Business' Data Breach Investigation Report has highlighted the hospitality and retail sector as a prime target of data thieves in recent years.

The report this year included data from the Australian Federal Police and highlighted an increase in automated attacks against PoS systems of small hospitality and retail businesses.

Copyright © SC Magazine, US edition


Trojan hits hotel payment apps
 
 
 
Top Stories
NBN Co names first 140 FTTN sites
National trial extended.
 
Cloud, big data propel bank CISOs into the boardroom
And this time, they are welcome.
 
Photos: A tour of CommBank's new innovation lab
Oculus Rift, Kinect and more.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  23%
 
End user computing (desktops, mobiles, apps)
  12%
 
Software development
  27%
TOTAL VOTES: 228

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  62%
 
No
  38%
TOTAL VOTES: 69

Vote