Skip to main content
Top
Published in: Journal of Computer Virology and Hacking Techniques 3/2017

26-05-2016 | Original Paper

Evolution and characterization of point-of-sale RAM scraping malware

Author: Ricardo J. Rodríguez

Published in: Journal of Computer Virology and Hacking Techniques | Issue 3/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Credit and debit cards are becoming the primary payment method for purchases. These payments are normally performed in merchant’s in-store systems as known as Point-of-Sale (POS) systems. Since these systems handle payment card data while processing the customer transactions, they are becoming a primary target for cybercriminals. These data, when remain at memory, are scraped and exfiltrated by specially crafted malicious software named POS RAM scraping malware. In recent years, large data breaches occurred in well-known US retail companies were caused by this kind of malware. In this paper, we study the features of these malware based on their behavior on different stages: infection and persistence, process and data of interest search, and exfiltration. Then, we classify samples of 22 known POS RAM scraping malware families from 2009 to 2015 according to these features. Our findings show these malware are still immature and use well-defined behavioral patterns for data acquirement and exfiltration, which may make their malicious activity easily detectable by process and network monitoring tools.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Adida, B., Bond, M., Clulow, J., Lin, A., Murdoch, S., Anderson, R., Rivest, R.: Phish and chips. In: Christianson, B., Crispo, B., Malcolm, J., Roe, M. (eds.) Proceedings of the 14th International Workshop on Security Protocols. Lecture Notes in Computer Science, vol. 5087, pp. 40–48. Springer, Berlin (2009). doi:10.1007/978-3-642-04904-0_7 Adida, B., Bond, M., Clulow, J., Lin, A., Murdoch, S., Anderson, R., Rivest, R.: Phish and chips. In: Christianson, B., Crispo, B., Malcolm, J., Roe, M. (eds.) Proceedings of the 14th International Workshop on Security Protocols. Lecture Notes in Computer Science, vol. 5087, pp. 40–48. Springer, Berlin (2009). doi:10.​1007/​978-3-642-04904-0_​7
4.
go back to reference Bond, M., Choudary, O., Murdoch, S., Skorobogatov S, Anderson, R.: Chip and skim: cloning EMV cards with the pre-play attack. In: IEEE Symposium on Security and Privacy (SP), pp. 49–64 (2014). doi:10.1109/SP.2014.11 Bond, M., Choudary, O., Murdoch, S., Skorobogatov S, Anderson, R.: Chip and skim: cloning EMV cards with the pre-play attack. In: IEEE Symposium on Security and Privacy (SP), pp. 49–64 (2014). doi:10.​1109/​SP.​2014.​11
9.
go back to reference Collberg, C.S., Thomborson, C.: Watermarking, tamper-proofing, and obfuscation—tools for software protection. IEEE Trans. Softw. Eng. 28(8), 735–746 (2002)CrossRef Collberg, C.S., Thomborson, C.: Watermarking, tamper-proofing, and obfuscation—tools for software protection. IEEE Trans. Softw. Eng. 28(8), 735–746 (2002)CrossRef
10.
go back to reference Dagon, D., Gu, G., Lee, C., Lee, W.: A taxonomy of botnet structures. In: Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC), pp. 325–339 (2007). doi:10.1109/ACSAC.2007.44 Dagon, D., Gu, G., Lee, C., Lee, W.: A taxonomy of botnet structures. In: Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC), pp. 325–339 (2007). doi:10.​1109/​ACSAC.​2007.​44
14.
go back to reference Felt, A.P., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A survey of mobile malware in the wild. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), pp. 3–14. ACM, New York (2011). doi:10.1145/2046614.2046618 Felt, A.P., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A survey of mobile malware in the wild. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), pp. 3–14. ACM, New York (2011). doi:10.​1145/​2046614.​2046618
15.
go back to reference Filiol, E.: Metamorphism, formal grammars and undecidable code mutation. Int. J. Comput. Electr. Autom. Control Inform. Eng. 1(2), 281–286 (2007) Filiol, E.: Metamorphism, formal grammars and undecidable code mutation. Int. J. Comput. Electr. Autom. Control Inform. Eng. 1(2), 281–286 (2007)
17.
go back to reference Francis, L., Hancke, G., Mayes, K., Markantonakis, K.: Practical relay attack on contactless transactions by using NFC mobile phones. In: Lo, N.W., Li, Y. (eds.) Proceedings of the 2012 Workshop on RFID and IoT Security (RFIDsec 2012 Asia). Cryptology and Information Security Series, vol. 8, pp. 21–32. IOS Press, Amsterdam (2012) Francis, L., Hancke, G., Mayes, K., Markantonakis, K.: Practical relay attack on contactless transactions by using NFC mobile phones. In: Lo, N.W., Li, Y. (eds.) Proceedings of the 2012 Workshop on RFID and IoT Security (RFIDsec 2012 Asia). Cryptology and Information Security Series, vol. 8, pp. 21–32. IOS Press, Amsterdam (2012)
18.
go back to reference Frisby, W., Moench, B., Recht, B., Ristenpart T.: Security analysis of smartphone point-of-sale systems. In: Proceedings of the 6th USENIX Conference on Offensive Technologies. WOOT’12, pp. 1–12. USENIX Association, Berkeley (2012) Frisby, W., Moench, B., Recht, B., Ristenpart T.: Security analysis of smartphone point-of-sale systems. In: Proceedings of the 6th USENIX Conference on Offensive Technologies. WOOT’12, pp. 1–12. USENIX Association, Berkeley (2012)
20.
go back to reference Gomzin, S.: Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions, 1st edn. Wiley, New York (2014) Gomzin, S.: Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions, 1st edn. Wiley, New York (2014)
21.
go back to reference Guo, F., Ferrie, P., Chiueh, T.C.: A study of the packer problem and its solutions. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) Recent Advances in Intrusion Detection (RAID), Lecture Notes in Computer Science, vol. 5230, pp. 98–115. Springer, Berlin (2008). doi:10.1007/978-3-540-87403-4_6 Guo, F., Ferrie, P., Chiueh, T.C.: A study of the packer problem and its solutions. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) Recent Advances in Intrusion Detection (RAID), Lecture Notes in Computer Science, vol. 5230, pp. 98–115. Springer, Berlin (2008). doi:10.​1007/​978-3-540-87403-4_​6
23.
go back to reference Haselsteiner, E., Breitfuß, K.: Security in near field communication (NFC)—strengths and weaknesses. In: Proceedings of the Workshop on RFID Security and Privacy (RFIDSec) (2006) Haselsteiner, E., Breitfuß, K.: Security in near field communication (NFC)—strengths and weaknesses. In: Proceedings of the Workshop on RFID Security and Privacy (RFIDSec) (2006)
24.
go back to reference Hizver, J., Chiueh, T.C.: Automated discovery of credit card data flow for PCI DSS compliance. In: Proceedings of the 2011 IEEE 30th International Symposium on Reliable Distributed Systems (SRDS), pp. 51–58. IEEE Computer Society, Washington, DC (2011). doi:10.1109/SRDS.2011.15 Hizver, J., Chiueh, T.C.: Automated discovery of credit card data flow for PCI DSS compliance. In: Proceedings of the 2011 IEEE 30th International Symposium on Reliable Distributed Systems (SRDS), pp. 51–58. IEEE Computer Society, Washington, DC (2011). doi:10.​1109/​SRDS.​2011.​15
35.
go back to reference Lindorfer, M., Kolbitsch, C., Milani Comparetti, P. Detecting environment-sensitive malware. In: Proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection (RAID). Lecture Notes in Computer Science, vol. 6961, pp. 338–357. Springer, Berlin (2011). doi:10.1007/978-3-642-23644-0_18 Lindorfer, M., Kolbitsch, C., Milani Comparetti, P. Detecting environment-sensitive malware. In: Proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection (RAID). Lecture Notes in Computer Science, vol. 6961, pp. 338–357. Springer, Berlin (2011). doi:10.​1007/​978-3-642-23644-0_​18
36.
go back to reference Line, M.B., Zand, A., Stringhini, G., Kemmerer, R.: Targeted attacks against industrial control systems: is the power industry prepared? In: Proceedings of the 2nd Workshop on Smart Energy Grid Security (SEGS), SEGS ’14, pp. 13–22. ACM, New York (2014). doi:10.1145/2667190.2667192 Line, M.B., Zand, A., Stringhini, G., Kemmerer, R.: Targeted attacks against industrial control systems: is the power industry prepared? In: Proceedings of the 2nd Workshop on Smart Energy Grid Security (SEGS), SEGS ’14, pp. 13–22. ACM, New York (2014). doi:10.​1145/​2667190.​2667192
40.
go back to reference Murdoch, S., Drimer, S., Anderson, R., Bond, M.: Chip and PIN is broken. In: IEEE Symposium on Security and Privacy (SP), pp. 433–446 (2010). doi:10.1109/SP.2010.33 Murdoch, S., Drimer, S., Anderson, R., Bond, M.: Chip and PIN is broken. In: IEEE Symposium on Security and Privacy (SP), pp. 433–446 (2010). doi:10.​1109/​SP.​2010.​33
41.
go back to reference Murdoch, S.J., Anderson, R.: Security protocols and evidence: where many payment systems fail. In: Christin, N., Safavi-Naini, R. (eds.) Proceedings of the 18th international conference on financial cryptography and data security (FC). Lecture Notes in Computer Science, vol. 8437, pp. 21–32. Springer, Berlin (2014). doi:10.1007/978-3-662-45472-5_2 Murdoch, S.J., Anderson, R.: Security protocols and evidence: where many payment systems fail. In: Christin, N., Safavi-Naini, R. (eds.) Proceedings of the 18th international conference on financial cryptography and data security (FC). Lecture Notes in Computer Science, vol. 8437, pp. 21–32. Springer, Berlin (2014). doi:10.​1007/​978-3-662-45472-5_​2
43.
go back to reference Oorschot, P.: Revisiting software protection. In: Boyd, C., Mao, W. (eds.) Proceedings of the 6th International Conference on Information Security (ISC). Lecture Notes in Computer Science, vol. 2851, pp. 1–13. Springer, Berlin (2003). doi:10.1007/10958513_1 Oorschot, P.: Revisiting software protection. In: Boyd, C., Mao, W. (eds.) Proceedings of the 6th International Conference on Information Security (ISC). Lecture Notes in Computer Science, vol. 2851, pp. 1–13. Springer, Berlin (2003). doi:10.​1007/​10958513_​1
45.
go back to reference Rantos, K., Markantonakis, K.: Analysis of potential vulnerabilities in payment terminals. In: Markantonakis, K., Mayes, K. (eds.) Secure smart embedded devices, platforms and applications, pp. 311–333. Springer, New York (2014). doi:10.1007/978-1-4614-7915-4_13 Rantos, K., Markantonakis, K.: Analysis of potential vulnerabilities in payment terminals. In: Markantonakis, K., Mayes, K. (eds.) Secure smart embedded devices, platforms and applications, pp. 311–333. Springer, New York (2014). doi:10.​1007/​978-1-4614-7915-4_​13
47.
go back to reference de Ruiter, J., Poll, E.: Formal analysis of the EMV protocol suite. In: Mödersheim, S., Palamidessi, C. (eds.) Theory of Security and Applications, Lecture Notes in Computer Science, vol. 6993, pp. 113–129. Springer, Berlin (2012). doi:10.1007/978-3-642-27375-9_7 de Ruiter, J., Poll, E.: Formal analysis of the EMV protocol suite. In: Mödersheim, S., Palamidessi, C. (eds.) Theory of Security and Applications, Lecture Notes in Computer Science, vol. 6993, pp. 113–129. Springer, Berlin (2012). doi:10.​1007/​978-3-642-27375-9_​7
49.
go back to reference Sarkar, S., Mitra, S., Roy, A.: Point of sale vulnerabilities: solution approach. Tech. rep, Infosys (2014) Sarkar, S., Mitra, S., Roy, A.: Point of sale vulnerabilities: solution approach. Tech. rep, Infosys (2014)
50.
go back to reference Smith, D.C.: Preventing point-of-sale system intrusions. Tech. rep, Naval Postgraduate School (2014) Smith, D.C.: Preventing point-of-sale system intrusions. Tech. rep, Naval Postgraduate School (2014)
55.
go back to reference Ugarte-Pedrero, X., Balzarotti, D., Grueiro, I.S., Bringas, P.G.: SoK: deep packer inspection: a longitudinal study of the complexity of run-time packers. In: Proceedings of the 36th IEEE Symposium on Security and Privacy, pp. 659–673 (2015). doi:10.1109/SP.2015.46 Ugarte-Pedrero, X., Balzarotti, D., Grueiro, I.S., Bringas, P.G.: SoK: deep packer inspection: a longitudinal study of the complexity of run-time packers. In: Proceedings of the 36th IEEE Symposium on Security and Privacy, pp. 659–673 (2015). doi:10.​1109/​SP.​2015.​46
56.
go back to reference Upendar, J., Rao, E.G.: An overview of plastic card frauds and solutions for avoiding fraudster transactions. Int. J. Res. Eng. Technol. 2(8), 215–222 (2013)CrossRef Upendar, J., Rao, E.G.: An overview of plastic card frauds and solutions for avoiding fraudster transactions. Int. J. Res. Eng. Technol. 2(8), 215–222 (2013)CrossRef
57.
go back to reference Vila, J., Rodríguez, R.J.: Practical experiences on NFC relay attacks with android: virtual pickpocketing revisited. In: Proceedings of the 11th International Workshop on RFID Security (RFIDsec). Lecture Notes in Computer Science, vol. 9440, pp. 87–103. Springer, Berlin (2015). doi:10.1007/978-3-319-24837-0_6 Vila, J., Rodríguez, R.J.: Practical experiences on NFC relay attacks with android: virtual pickpocketing revisited. In: Proceedings of the 11th International Workshop on RFID Security (RFIDsec). Lecture Notes in Computer Science, vol. 9440, pp. 87–103. Springer, Berlin (2015). doi:10.​1007/​978-3-319-24837-0_​6
59.
go back to reference Wang, Y.M., Roussev, R., Verbowski, C., Johnson, A., Wu, M.W., Huang, Y., Kuo, S.Y.: Gatekeeper: monitoring auto-start extensibility points (ASEPs) for spyware management. In: Proceedings of the 18th USENIX Conference on System Administration. LISA ’04, pp. 33–46. USENIX Association, Berkeley (2004) Wang, Y.M., Roussev, R., Verbowski, C., Johnson, A., Wu, M.W., Huang, Y., Kuo, S.Y.: Gatekeeper: monitoring auto-start extensibility points (ASEPs) for spyware management. In: Proceedings of the 18th USENIX Conference on System Administration. LISA ’04, pp. 33–46. USENIX Association, Berkeley (2004)
60.
go back to reference Weaver, N., Paxson, V., Staniford, S., Cunningham, R.: A taxonomy of computer worms. In: Proceedings of the 2003 ACM Workshop on Rapid Malcode (WORM). WORM ’03, pp. 11–18. ACM, New York (2003). doi:10.1145/948187.948190 Weaver, N., Paxson, V., Staniford, S., Cunningham, R.: A taxonomy of computer worms. In: Proceedings of the 2003 ACM Workshop on Rapid Malcode (WORM). WORM ’03, pp. 11–18. ACM, New York (2003). doi:10.​1145/​948187.​948190
Metadata
Title
Evolution and characterization of point-of-sale RAM scraping malware
Author
Ricardo J. Rodríguez
Publication date
26-05-2016
Publisher
Springer Paris
DOI
https://doi.org/10.1007/s11416-016-0280-4

Other articles of this Issue 3/2017

Journal of Computer Virology and Hacking Techniques 3/2017 Go to the issue

Premium Partner