Bureau cyber investigators have identified software signatures used in a new point-of-sale malware dubbed ‘Punkey’.
Security technicians are being urged to identify victims of Punkey hacks, and to remove the hacking software from within secure payment networks. Several high-profile hacks have used PoS malware in recent years, including those against the retailers Target and Home Depot.
The malware works by scanning uncoded plaintext credit card data that is found in the random access memory of payment processing computers, card readers, and terminals that are used to make purchases, by sliding credit cards through a reader during payment transactions.
The stolen data is then posted for sale to others online in dark net forums used by criminals and other hackers.
Punkey also has capabilities that allow the malware to download additional malware tools into infected systems. Some 75 point-of-sale terminals were found to be infected by Punkey software, according to security researchers.
Every day we send out a free e-mail with the most important headlines of the last 24 hours.
Subscribe now