FBI warns of crimewave striking money registers

Image of money register courtesy of ShutterstockThe US Federal Bureau of Investigations (FBI) has warned retailers to harden their defences against cyber-heists – particularly those that latch onto acclaim card details from shoppers, as actually happened to Target.

The BBC reports that Reuters got its hands on the warning, which went out as a classified report to large retailers.

The FBI reportedly said that over the past year, it’s seen about 20 cases in which data was stolen using the similar type of malware as that inserted onto Target’s credit and debit card swiping-machines, money registers and other point-of-sale (PoS) tools.

The agency expects PoS malware crime to continue to grow in the near term, despite whatever mitigations law enforcement and security firms throw at it.

The profits are huge, and the PoS virus code is both too cheap and too widely available on dissident markets for thieves to resist, the FBI said.

According to the FBI’s report, one copy of this type of PoS malware was found on retailing for only $6,000 (£3,600).

That’s actually a bit pricey. I don’t know where they’re shopping, but they’re paying top dollar.

Cybersecurity consultants Group-IB back in September 2013 actually found booby-trapped bank card readers for half that price.

The ones they came across were bundled with a suite of money-stealing support services that offered to make scam crimes a snap: $2,000 (£1,200) on a hire-purchase basis or $3,000 (£1,800) for those crooks who just want to buy the hacked terminals outright.

The FBI wasn’t naming names when it came to whose PoS systems have been ambushed, mind you, but the name Target is the one that’s ringing a lot of bells in that branch these days.

A couple weeks ago, Target CEO Gregg Steinhafel told CNBC in an interview that there was malware installed on the retailer’s PoS registers.

We don’t know yet whether those rigged registers were behind the breach of Target’s (at least) 70 million data records.

But it wouldn’t be terribly surprising if those hacked PoS systems were the means by which the thief got to the vast universe of Target customers and guests.

As SophosLabs researcher Numaan Huq describes in this Naked safety article, this type of card fraud is ripe for setting us up to get card data plucked from our hands if we so much as pull out the plastic to pay for one measly candy bar.

In fact, “Buy candy, lose your credit card” is the name of a 2014 RSA safety conference session in which Numaan and Chester Wisniewski will be presenting a paper on the industrialization of this type of card fraud, in February.

The subject of the paper and the presentation is one specific type of PoS malware called RAM scraping very interesting stuff that gets into the nuances of how data is most definitely not encrypted end-to-end in PoS systems, in spite of their being compliant with the expense card industry’s data safety standards, PCI-DSS, and how RAM scraping takes advantage of that.

Hacker Guccifer apparently arrested in Romania

Guccifer, hacker of the stars, has supposedly been nabbed by police in Romania.

Guccifer has grabbed a slew of stuff from celebrity over his star-studded career, counting ex-US President Bush’s self-portrait in the bathtub, former US Secretary of State Colin Powell’s Facebook account, emails that portray Powell as having an issue with Romanian politician Corina Cretu, and yet the script for the Downton Abbey finale.

According to a Romanian news story, a man supposed to be the hacker, Marcel LazarusLehel, was captured Wednesday in his township.Much of the reporting is coming from Romanian sources, meaning we’re relying on web-based translation, but The Times says that so far, we know this about the man being held:

Although little is known about Mr Lehel, it is understood he was sentenced to three years supervised release in February 2012 after being under arrest … for hacking the e-mail and Facebook accounts of various public figures in Romania.

According to the Romanian newspaper Adevarul, police tracked Lehel down to his township of Sâmbăteni, in the commune of Arad County, where he lives with his wife and daughter and rarely leaves the house.

The raid was organized by Romania’s Directorate of Investigating Organized Crime and Terrorism, who said that they were cooperating with US establishment.Adevarul reports that Lehel has used the alias “Little Smoke” in the past.

The newspaper quoted the commune’s mayor, Petru Nicoară, who went to the township on Wednesday morning:

Everyone describes him just as I knew him: as a silence man who keeps to the house… I heard he spent his days at the computer.

Of course, plenty of us spend our days innocently enough at our computers so we’ll presume Lehel is innocent awaiting confirmed guilty.