Lumension® Endpoint Intelligence Center

Intelligence Center » News Archive » New POS malware uses mailslots to avoid detection

New POS malware uses mailslots to avoid detection

2015/03/03

Threatpost - (International) Security researchers from Morphick discovered that the new LogPOS point-of-sale (PoS) malware uses Microsoft Windows' mailslots technology to avoid detection. inject code, and act like a client while it relays stolen payment card numbers to a command and control (C&C) server.

Source: http://threatpost.com/new-pos-malware-uses-mailslots-to-avoid-detection/111391

Note: This news synopsis is taken from the DHS Daily Open Source Infrastructure Report, a daily [Monday through Friday, except US Federal holidays] summary of open-source published information concerning significant critical infrastructure issues; a 10-day archive of the DOSIR can be found at: http://www.dhs.gov/dhs-daily-open-source-infrastructure-report.


Last Updated: 27 May 2016 10:23:35