DMSniff Point-of-Sale Malware Silently Attacked SMBs For Years

LASER_oneXM

Level 37
Thread author
Verified
Top Poster
Well-known
Feb 4, 2016
2,520
A Point-of-Sale (POS) malware which uses a domain generation algorithm to create command-and-control domains on the fly was deployed in attacks against small and medium-sized businesses during the last past four years—since at least 2016—according to a team of security researchers from Flashpoint.

The Flashpoint team believes that the malware they dubbed DMSniff "could be gaining an initial foothold on devices either by using brute-force attacks against SSH connections or by scanning for vulnerabilities and exploiting those."

Additionally, while POS malware is not that uncommon having been observed the wild multiple times throughout the years [1, 2, 3, 4], the researchers state in their in-depth analysis that DMSniff's usage of a domain generation algorithm (DGA) to generate command-and-control domains on the spot unquestionably sets it apart from other similar malware.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top