According to security researchers, the sophisticated Angler exploit kit which is a popular kit in the cybercrime circles is now targeting point-of-sales (PoS) systems. As per experts, this is the first time that an exploit kit has included in its list of hackable platforms, putting them alongsides of Adobe Flash, Reader, Java and Internet Explorer. The exploit kit often establishes a network beachhead with a malvertising campaign targeting web PoS terminals and vendors including Verifone. The PoS reconnaissance Trojan (Troj_Recoload.a) checks for multiple conditions in the infected system such as if it is a PoS machine or part of a PoS network. It then proceeds to download specific malware depending on the conditions met.
The information provided herein is on "as is" basis, without warranty of any kind.
Mauritian Computer Emergency Response Team (CERT-MU)
National Computer Board
7th Floor, Stratton Court
La Poudriere Street