Lumension® Endpoint Intelligence Center

Intelligence Center » News Archive » New POS trojan created by mixing code from older malware

New POS trojan created by mixing code from older malware

2015/09/17

Help Net Security - (International) Security researchers from Dr. Web discovered a new trojan dubbed Trojan.MWZLesson, targeting point-of-sale (PoS) terminals to obtain bank card data from the device's compromised random access memory (RAM), that was pieced together with parts of the Neutrino backdoor and the Dexter PoS trojan. The malware can update itself, download and execute files, find documents, and mount HyperText Transport Protocol (HTTP) Flood attacks.

Source: http://www.net-security.org/malware_news.php?id=3101

Note: This news synopsis is taken from the DHS Daily Open Source Infrastructure Report, a daily [Monday through Friday, except US Federal holidays] summary of open-source published information concerning significant critical infrastructure issues; a 10-day archive of the DOSIR can be found at: http://www.dhs.gov/dhs-daily-open-source-infrastructure-report.


Last Updated: 27 May 2016 10:25:16