- Jun 9, 2013
- 6,720
criminal group is using compromised LogMeIn accounts belonging to systems running PoS software to access those computers and infect them with the new PosCardStealer malware.
At the end of June, PandaLabs was reporting on a wave of PoS infections that had hit over 200 systems, mainly in the US. All systems were infected with a relatively new PoS malware strain named PunkeyPOS.
After publicly disclosing the attacks, PandaLabs continued to investigate the infected systems, and their efforts paid off because they discovered more details about the criminal group's mode of operation.
Group used LogMeIn to access computers running PoS software
PandaLabs researchers say the group managed to obtain the LogMeIn user credentials for accounts used on computers running PoS software and connected to PoS terminals. LogMeIn is a tool similar to TeamViewer that allows users to log in and manage remote devices.
Full Article. Criminal Group Uses LogMeIn to Compromise PoS Systems with Malware
At the end of June, PandaLabs was reporting on a wave of PoS infections that had hit over 200 systems, mainly in the US. All systems were infected with a relatively new PoS malware strain named PunkeyPOS.
After publicly disclosing the attacks, PandaLabs continued to investigate the infected systems, and their efforts paid off because they discovered more details about the criminal group's mode of operation.
Group used LogMeIn to access computers running PoS software
PandaLabs researchers say the group managed to obtain the LogMeIn user credentials for accounts used on computers running PoS software and connected to PoS terminals. LogMeIn is a tool similar to TeamViewer that allows users to log in and manage remote devices.
Full Article. Criminal Group Uses LogMeIn to Compromise PoS Systems with Malware