Home Malware Programs Trojans Trojan.POSRAM

Trojan.POSRAM

Posted: April 10, 2014

Threat Metric

Ranking: 3,358
Threat Level: 1/10
Infected PCs: 13,809
First Seen: April 10, 2014
Last Seen: October 17, 2023
OS(es) Affected: Windows


Trojan.POSRAM is a PoS or Point-of-Sale Trojan that collects credit card information from systems used in business transactions. Trojan.POSRAM is a major player in the Kaptoxa campaign, which successfully compromised the data of millions of customers of major shopping outlets. Since Trojan.POSRAM possesses advanced means of avoiding detection, updated anti-malware utilities and security protocols are important in preventing Trojan.POSRAM's installation or removing Trojan.POSRAM, and malware experts recommend that customers of compromised stores watch their credit card bills for signs of any unusual charges.

A New BlackPOS Gets Cybercrooks Back in the Black

Trojan.POSRAM is spyware that specializes in infiltrating the machines used to process sales transactions. Although Trojan.POSRAM is believed to be an updated version of a similar Trojan, BlackPOS, Trojan.POSRAM also has additional functions that make it more difficult for anti-malware utilities to detect Trojan.POSRAM in comparison to its predecessor. So far, malware researchers only have verified Trojan.POSRAM attacks for the Neiman Marcus and Target store chains, but this campaign already has been successful in stealing what's estimated to be over a million separate credit card records from customers. Target was the victim of the bulk of these thefts, averaging at six thousand, five hundred thefts per store location.

Trojan.POSRAM monitors relevant memory addresses and pulls the credit card information directly from the machine's memory, which allows Trojan.POSRAM to target data that's protected by a secure company network. Trojan.POSRAM attempts to transmit this data on a daily basis at a pre-designated time by using a temporary NetBIOS share to an internalized host. Ultimately, this lets Trojan.POSRAM transfer information through a standard FTP protocol, handing it over to third parties.

The presence of other threat actors also has been implicated in Trojan.POSRAM's 'Kaptoxa' attacks, although they are still being identified. Separate PC threats may be used to distribute Trojan.POSRAM, maintain the security compromise and provide a backup method of transferring any stolen credit card credentials. Importantly, malware researchers stress that Trojan.POSRAM does not show symptoms during its attacks and is designed to conceal itself completely from any casual observation, like most high-end spyware.

Stopping a Point-of-Sale Computer from Turning into a Point of Financial Woe

While the two store chains affected by Trojan.POSRAM attacks have not been notably slow in their response, the fact remains that even this brief campaign of PoS infiltration has allowed Trojan.POSRAM's owners to gain access to millions of credit card details, including the associated PIN numbers. Given the sophistication of Trojan.POSRAM's anti-security features and the recent development of its assaults, other store chains also may be vulnerable to Trojan.POSRAM attacks. Proper PC security is essential for blocking Trojan.POSRAM or, if necessary, removing Trojan.POSRAM from store machines.

Although casual PC users who don't work in retail are not likely to be attacked by Trojan.POSRAM directly, they may suffer from having their credit cards exploited. If you've shopped at Target or Neiman Marcus within the last few months, malware experts vehemently suggest that you watch carefully your credit card expenses. Any unusual charges are possible signs of outsiders using your own credit card against you, even if your local store already has taken steps to remove Trojan.POSRAM after a previous attack.

Loading...