Viry a Červi

Iran crew stole Charlie Hebdo database, says Microsoft

The Register - Anti-Virus - 4 Únor, 2023 - 09:45
Same gang pestered US voters during 2020 presidential election

Microsoft believes the gang who boasted it had stolen and leaked more than 200,000 Charlie Hebdo subscribers' personal information is none other than a Tehran-backed criminal group.…

Kategorie: Viry a Červi

HeadCrab bots pinch 1,000+ Redis servers to mine coins

The Register - Anti-Virus - 4 Únor, 2023 - 01:27
We devoting full time to floating under /etc

A sneaky botnet dubbed HeadCrab that uses bespoke malware to mine for Monero has infected at least 1,200 Redis servers in the last 18 months.…

Kategorie: Viry a Červi

Fast-evolving Prilex POS malware can block contactless payments

The Register - Anti-Virus - 3 Únor, 2023 - 21:25
... forcing users to insert their cards into less-secure PIN systems

The reasons businesses and consumers like contactless payment transactions – high security and speed – are what make those systems bad for cybercriminals.…

Kategorie: Viry a Červi

Guy accused of wrecking crypto exchange now hauled into court

The Register - Anti-Virus - 3 Únor, 2023 - 20:30
Mango Markets still offline for now ... but v4 comeback release looms

The man accused of bringing down decentralized crypto exchange Mango Markets through market manipulation has made his first appearance in court in connection with the theft of millions in cryptocurrency.…

Kategorie: Viry a Červi

OpenSSH fixes double-free memory bug that’s pokable over the network

Sophos Naked Security - 3 Únor, 2023 - 18:59
It's a bug fix for a bug fix. A memory leak was turned into a double-free that has now been turned into correct code...

Another RAC staffer nabbed for storing, sharing car crash data

The Register - Anti-Virus - 3 Únor, 2023 - 12:30
Once is an accident. Twice is coincidence. Surely there won't be a third for roadside assistance biz

A former employee of RAC, one of Britain's major roadside recovery service operators, has pleaded guilty to data theft after he stored traffic accident information on his personal device that was passed onto claims companies.…

Kategorie: Viry a Červi

LockBit brags it pumped ION full of ransomware

The Register - Anti-Virus - 3 Únor, 2023 - 08:30
Crims put a February 4 deadline for software slinger to pay up

UK regulators are investigating a cyberattack against financial technology firm ION, while the LockBit ransomware gang has threatened to publish the stolen data on February 4 if the software provider doesn't pay up.…

Kategorie: Viry a Červi

Chinese 'surveillance balloon' over US causes fearful gasbagging

The Register - Anti-Virus - 3 Únor, 2023 - 06:32
Floats over missile silos, shooting it down ruled more dangerous than whatever it's up to

Updated  A Chinese high-altitude potential spy balloon, spotted drifting over America, has caused concern about national security – though the US Department of Defense says it will not be shot down by F22s at this time.…

Kategorie: Viry a Červi

Former Ubiquiti dev pleads guilty in data theft and extortion case

The Register - Anti-Virus - 3 Únor, 2023 - 02:30
Nickolas Sharp now faces up to 35 years in prison

A former Ubiquiti Networks employee accused of hatching an elaborate plot to first steal nearly $2 million from his employer, extort more, then later orchestrating a smear campaign against the company pleaded guilty to multiple felony charges Thursday.…

Kategorie: Viry a Červi

Malvertising attacks are distributing .NET malware loaders

The Register - Anti-Virus - 2 Únor, 2023 - 20:27
The campaign illustrates another option for miscreants who had relied on Microsoft macros

Malvertising attacks are being used to distribute virtualized .NET loaders that are highly obfuscated and dropping info-stealer malware.…

Kategorie: Viry a Červi

Super Bock says 'cyber' nasty 'disrupting computer services'

The Register - Anti-Virus - 2 Únor, 2023 - 12:15
Portugal's biggest exporter of beer warns of restrictions to supply chain

Super Bock Group, Portugal's largest beverage biz, is warning of potential interruption to supplies as it manages the fallout from cybercrooks attacking its tech infrastructure.…

Kategorie: Viry a Červi

Google boosts bounties for open source flaws found via fuzzing

The Register - Anti-Virus - 2 Únor, 2023 - 00:01
Max reward per project integration is now $30k

Google sweetened the potential pot to $30,000 for bug hunters in its open source OSS-Fuzz code testing project.…

Kategorie: Viry a Červi

Password-stealing “vulnerability” reported in KeePass – bug or feature?

Sophos Naked Security - 1 Únor, 2023 - 20:58
Is it a vulnerability if someone with control over your account can mess with files that your account is allowed to access anyway?

Microsoft sweeps up after breaking .NET with December security updates

The Register - Anti-Virus - 1 Únor, 2023 - 19:59
XPS doc display issues fixed – until the next patch, at least

Microsoft this week rolled out fixes to issues caused by security updates released in December 2022 that botched how XPS documents are displayed in various versions of .NET and .NET Framework.…

Kategorie: Viry a Červi

Attackers abuse Microsoft’s 'verified publisher' status to steal data

The Register - Anti-Virus - 1 Únor, 2023 - 07:30
Malicious OAuth apps were the tickets into victims' systems

Miscreants using malicious OAuth applications abused Microsoft's "verified publisher" status to gain access to organizations' cloud environments, then steal data and pry into to users' mailboxes, calendars, and meetings.…

Kategorie: Viry a Červi

Microsoft upgrades Defender to lock down Linux gear for its own good

The Register - Anti-Virus - 31 Leden, 2023 - 21:45
Ballmer thought this kernel was cancer, Nadella may disagree

Organizations using Microsoft's Defender for Endpoint will now be able to isolate Linux devices from their networks to contain intrusions and whatnot.…

Kategorie: Viry a Červi

GitHub code-signing certificates stolen (but will be revoked this week)

Sophos Naked Security - 31 Leden, 2023 - 20:35
There was a breach, so the bad news isn't great, but the good news isn't too bad...

New year, new storage challenge

The Register - Anti-Virus - 31 Leden, 2023 - 14:01
How to keep unstructured data secure

Webinar  If your IT team is making new year resolutions, one of them might be to ramp up safeguarding measures for the increasing amount of unstructured data being captured by businesses and organizations.…

Kategorie: Viry a Červi

Prilex modification now targeting contactless credit card transactions

Kaspersky Securelist - 31 Leden, 2023 - 09:00

Prilex is a singular threat actor that has evolved from ATM-focused malware into unique modular PoS malware—actually, the most advanced PoS threat we have seen so far, as described in a previous article. Forget about those old memory scrapers seen in PoS attacks. Prilex goes beyond these, and it has evolved very differently. This is highly advanced malware adopting a unique cryptographic scheme, doing real-time patching in target software, forcing protocol downgrades, manipulating cryptograms, doing GHOST transactions and performing credit card fraud—even on cards protected with the so-called unhackable CHIP and PIN technology. And now, Prilex has gone even further.

A frequent question asked about this threat was whether Prilex was able to capture data coming from NFC-enabled credit cards. During a recent Incident Response for a customer hit by Prilex, we were able to uncover three new Prilex versions capable of blocking contactless payment transactions, which became very popular in the pandemic times.

This blog post covers the NFC-related capabilities of recent Prilex modifications.


Contactless payment systems are composed of credit and debit cards, key fobs, smart cards, or other devices, including smartphones and other mobile devices that use radio-frequency identification (RFID) or near-field communication (NFC, implemented in Samsung Pay, Apple Pay, Google Pay, Fitbit Pay, or any bank mobile application that supports contactless) for making secure payments.

The embedded integrated circuit chip and antenna enable consumers to pay by waving their card, fob, or handheld device over a reader at a point-of-sale terminal. Contactless payments are made in close physical proximity, unlike other types of mobile payments that use broad-area cellular or WiFi networks and do not require close physical proximity.

Different ways of tap-to-pay, but only one technology: NFC

Here is how they work:

  • To make a payment with a contactless credit card, the cardholder simply holds the card close to the contactless-enabled payment terminal (usually within a few inches).
  • The terminal sends a radio frequency (RF) signal to the card, activating the RFID chip embedded in the card.
  • The RFID chip in the card sends a unique identification number (ID) and transaction information to the terminal. The transaction data is non-reusable, so even if it is stolen by cybercriminals, they cannot steal the money by using that. Neither can they access the RFID chip to tamper with the data generation processes.
  • The terminal sends the transaction information to the card issuer’s processing network for authorization.
  • If the transaction is approved, the terminal sends a confirmation message to the cardholder, and the payment is processed.
The pandemic gave a boost to NFC payments

The size of the global market for contactless payments was estimated at $34.55 billion in 2021 and is expected to continue growing at a compound rate of 19.1% from 2022 to 2030 annually, according to GrandView Research. The market was dominated by the retail segment, which accounted for more than 59.0% of global contactless revenue in 2021. Recent years saw an increase in the number of retail tap-and-go transactions: retailers can clearly see the benefits of contactless payments, which reduce transaction time, increase revenue, and improve operational efficiency. As stated in a Mastercard global study covering the year 2020, 74.0% of retailers expressed the intention to continue using contactless payments beyond the pandemic.

According to the US Payments Forum, Visa reports that in the U.S., tap-to-pay accounts for 28% of all face-to-face transactions, five times the pre-pandemic levels, while Mastercard says that 82% of card-present transactions in the country are happening at contactless-enabled locations. In Australia, contactless payments were growing in popularity even before the pandemic, with four out of five point-of-sale purchases being contactless in 2019. In the coming years, the popularity of this payment method is expected to grow even more everywhere in the world.

Contactless credit cards offer a convenient and secure way to make payments without the need to physically insert or swipe the card. But what happens if a threat can disable these payments in the EFT software running in the computer and force you to insert the card in the PINpad reader?


We have observed three new Prilex versions in the wild and managed to obtain the latest one (version 06.03.8080). The two others are 06.03.8070 and 06.03.8072.

The obtained version was discovered as recently as November 2022 and appears to originate from a different codebase than the others we found at the beginning of that year. Prilex now implements a rule-based file that specifies whether or not to capture credit card information and an option to block NFC-based transactions.

Excerpt from a Prilex rules file referencing NFC blocking

This is due to the fact that NFC-based transactions often generate a unique ID or card number valid for only one transaction. If Prilex detects an NFC-based transaction and blocks it, the EFT software will program the PIN pad to show the following message:

Prilex fake error displayed on the PIN pad reader that says, “Contactless error, insert your card”

Of course, the goal here is to force the victim to use their physical card by inserting it into the PIN pad reader, so the malware will be able to capture the data coming from the transaction by using all the techniques described in our previous publication, such as manipulating cryptograms and performing a GHOST attack. Another interesting new feature added in the latest Prilex samples is the possibility to filter credit cards according to segment and create different rules for each segment. For example, these rules can block NFC and capture card data only if the card is a Black/Infinite, Corporate or another tier with a high transaction limit, which is much more attractive than standard credit cards with a low balance/limit.

Malware adapting to the latest trends

With contactless cards growing in numbers and adoption increasing all over the world, the number of payments using this method has increased significantly and is expected to grow further in the years to come. Since transaction data generated during a contactless payment are useless from a cybercriminal’s perspective, it is understandable that Prilex needs to force victims to insert the card into the infected PoS terminal. While the group is looking for a way to commit fraud with unique credit card numbers, this clever trick allows it to continue operating.

The Prilex family is detected by all Kaspersky products as HEUR:Trojan.Win32.Prilex and HEUR:Trojan.Win64.Prilex. More detailed analysis on the latest Prilex versions and a full analysis are available to customers of our private Threat Intelligence Reports. For any requests on this topic, please contact

Syndikovat obsah