Turk Posted January 18, 2014 Share Posted January 18, 2014 Los Angeles, California - January 17, 2014The massive data breach at Target during the 2013 holiday shopping season which the retailer now admits affected 70 million customers used an inexpensive "off the shelf" malware known as BlackPOS. The same malware may have also been involved in the Neiman Marcus attack.Security researchers from IntelCrawler, a Los-Angeles based cyber intelligence company, announced that the age of BlackPOS malware author is close to 17 years old and the first sample of it was created in March 2013. The first report on this malware was done in the beginning of spring by Andrew Komarov, IntelCrawler CEO, when he was working in another forensics company.According to own sources of IntelCrawler the first infected Point-of-Sales environments by BlackPOS were in Australia, Canada and the US. The first name of the malware was a lyric "Kaptoxa" ("potatoe" - in russian slang), which then was renamed to "DUMP MEMORY GRABBER by Ree[4]" for forums postings, but the title for C&C had string "BlackPOS". During that time, "Ree[4]" ("ree4") has sold more then 40 builds of BlackPOS to cybercriminals from Eastern Europe and other countries, including the owners of underground credit cards shops such as ".rescator", "Track2.name", "Privateservices.biz" and many others.The same dates the detailed information and reverse engineering report were shared with Visa and several major US banks, after which US LEA released internal notification for financial industry about that. The bad actor was pretty opened for trading this malware for 2 000 USD or by receiving 50% from selling of all intercepted credit cards by his customer through Liberty Reserve.[email protected]: http://ree4.7ci.ru/dump_grabber.php[email protected]: it is administrative panel[email protected]: password "pass"[email protected]: http://www.sendspace.com/file/zglgvy[email protected]: after infection you will receive "readme.txt", like "ping"The first C&C server of BlackPOS was installed on "ree4.7ci.ru", which was the personal host of its author with nickname "ree[4]". Some other hosts were found on this domain name, as probably it was used as a hosting for all members of the same group:- onlyddos.7ci.ru;- merzavetz.7ci.ru;- reperckov41.7ci.ru.[email protected]: http://plasmon.rghost.ru/44699041/image.pnghidden: how does it keep the data ( intercepted credit cards)?[email protected]: from left side it is files, time.txt, then you click on it and you will find dumps in browser in plaintexthidden: are there any differences in terms of infected Point-of-Sale systems?[email protected]: no, but there are some nuances, for examples it doesn't work on Verifonehidden: really? I have Verifones ...[email protected]: it grabs dumps from memory, Verifone can be connected to PC, but it will be "secured", you need standalone Point-of-Sale terminals with monitor and Windowshidden: how much?[email protected]: 2000 USD[email protected]: 1st buildPreviously he has created several tools used in hacking community for brute force attacks, such as "Ree4 mail brute", and also earned some first money with social networks accounts hacking and DDoS attacks trainings, as well as software development including malicious code.Investigators from IntelCrawler have also made a profiling on bad actor:E-mail 1: [email protected]E-mail 2: [email protected]ICQ: 565033Skype: s.r.a.ree4According to operative information from IntelCrawler, the person behind the nickname "ree[4]" is Sergey Taraspov, having roots in St.Petersburg and Nizhniy Novgorod (Russian Federation), very well known programmer of malicious code in underground."He is still visible for us, but the real bad actors responsible for the past attacks on retailers such as Target and Neiman Marcus were just his customers", comments Dan Clements, IntelCrawler President. Before both breaches IntelCrawler detected large-scale RDP brute-forcing attacks on Point-of-Sales terminals across the US, Australia and Canada started at the beginning of 2013 year in winter period with week passwords such as:"pos":"pos";"micros":"micros" (MICROS Systems, Inc. - Point-of-Sale Hardware);"edc":"123456" (EDC - Electronic Draft Capture).February 9th, 2013, 14:30URL:http://www.rf-cheats.ru/forum/archive/index.php/t-156884.htmlIP Address: 71.138.234.81Location: UNITED STATES, CALIFORNIA, LOS ANGELESLatitude & Longitude: 34.052230, -118.243680Connection: 26 INTERNATIONAL INCNet Speed: (COMP) Company/T1IDD & Area Code: 213/310/424/323ZIP Code: 90001Weather Station: LOS ANGELES (USCA0638)IP Address: 75.127.54.179Location: UNITED STATES, CALIFORNIA, LOS ANGELESLatitude & Longitude: 34.002300, -118.211520Connection: DESIGN COLLECTIONNet Speed: (COMP) Company/T1IDD & Area Code: 213/323ZIP Code: 90058Weather Station: LOS ANGELES (USCA0638)Usage Type: (COM) CommercialFebruary 21th, 2013, 13:36IP Address: 63.138.49.238Location: UNITED STATES, NEW YORK, FAIRPORTLatitude & Longitude: 43.088572, -77.432766Connection: PAETEC COMMUNICATIONS INC.Domain: PAETEC.COMNet Speed: (DSL) Broadband/CableIDD & Area Code: 585ZIP Code: 14450Weather Station: FAIRPORT (USNY0477)May 21th, 2013, 18-26URL: http://d3scene.ru/besplatnye-razdachi-i-pooschreniya/49081-razdacha-dedikov.htmlIP Address: 168.215.163.98Location:UNITED STATES, COLORADO, LONE TREELatitude & Longitude: 39.546295, -104.896772Connection: TW TELECOM HOLDINGS INC.Domain: TWTELECOM.NETNet Speed: (COMP) Company/T1IDD & Area Code: 303ZIP Code: 80124Weather Station: PARKER (USCO0306)According to The New York Times (NYT) Neiman Marcus acknowledged that the time stamp on the first intrusion was in mid-July, which may have good correlation with found compromised Point-of-Sales.July 19th, 2013URL: http://freegaming.ucoz.net/news/razdacha_dedikov/2013-07-19-3"EDC" - Electronic Draft Capture, also known as "EDC" or "Point Of Sale" (POS) allows you to capture and authorize a credit card.IP Address: 64.119.39.123Location: UNITED STATES, ARIZONA, TUCSONLatitude & Longitude: 32.044150, -110.734770Connection: PRIVATE CUSTOMERNet Speed: (COMP) Company/T1IDD & Area Code: 520ZIP Code: 85747Weather Station: TUCSON (USAZ0247)September 22nd, 2013, 15:52URL: http://ccc.gs/topic/2405-razdacha-dedikov/IP Address: 38.82.206.34Location: UNITED STATES, CALIFORNIA, VALENCIALatitude & Longitude: 34.406069, -118.535302Connection: TCAST COMMUNICATIONS INCDomain: COGENTCO.COMNet Speed (DSL): Broadband/CableIDD & Area Code: 661ZIP Code: 91355Weather Station: STEVENSON RANCH (USCA1095)"Most of the victims are department stores. More BlackPOS infections, as well as new breaches can appear very soon, retailers and security community should be prepared for them", commented Andrew Komarov, IntelCrawler CEO.About IntelCrawlerIntelCrawler.com is a multi-tier intelligence aggregator, which gathers information and cyber prints from a starting big data pool of over 3, 000, 000, 000 IPv4 and over 200, 000, 000 domain names, which are scanned for analytics and dissemination to drill down to a desired result. This finite pool of cyber prints is then narrowed further by comparing it to various databases and forum intelligence gathered from the underground and networked security company contacts. The final result could be the location of a particular keyboard or a computer housing the threat.http://intelcrawler.com/about/press08 Link to comment Share on other sites More sharing options...
Blackchildcx Posted January 19, 2014 Share Posted January 19, 2014 crazy... Link to comment Share on other sites More sharing options...
Recommended Posts