Subscribe

Purchasing POS malware gets easier

Staff Writer
By Staff Writer, ITWeb
Johannesburg, 17 Mar 2014

There is a growing ease of purchasing point-of-sale (POS) malware online, as well as an increase in the selling of stolen credit card numbers and other personal consumer data online.

These were some of the biggest findings from the McAfee Labs Threats Report: Fourth Quarter 2013, highlighting the role of the "dark Web" malware industry as a key enabler of the POS attacks and data breaches in the fall of 2013.

McAfee Labs also saw the number of digitally signed malware samples triple over the course of 2013, driven largely by the abuse of automated Content Distribution Networks (CDNs) that wrap malicious binaries within digitally signed, otherwise legitimate installers.

The security software vendor believes this accelerating trend could pose a significant threat to the long-established certificate authority (CA) model for authenticating "safe" software.

Cybercrime-as-a-service

Detailed research of the high-profile Q4 credit card data breaches found that the POS malware used in the attacks were relatively unsophisticated technologies likely purchased "off the shelf" from the cybercrime-as-a-service community, and customised specifically for these attacks.

McAfee Labs' ongoing research into underground "dark Web" markets further identified the attempted sale of stolen credit card numbers and personal information known to have been compromised in the Q4 retail breaches.

The researchers found the thieves offering for sale some of the 40 million credit card numbers reported stolen in batches of between one million and four million at a time.

"The fourth quarter of 2013 will be remembered as the period when cybercrime became 'real' for more people than ever before," says Vincent Weafer, senior VP for McAfee Labs. "These cyber thefts occurred at a time when most people were focused on their holiday shopping and when the industry wanted people to feel secure and confident in their purchases.

"The impact of these attacks will be felt both at the kitchen table as well as the boardroom table. For security practitioners, the 'off the shelf' genesis of some of these crime campaigns, the scale of operations, and the ease of digitally monetising stolen customer data all represent a coming of age for both cybercrime-as-a-service and the 'dark Web' overall."

By the end of 2013, McAfee Labs saw the number of malicious signed binaries in its database triple to more than eight million suspicious binaries. In the fourth quarter alone, McAfee Labs found more than 2.3 million new malicious signed applications, a 52% increase from the previous quarter.

The practice of code signing software validates the identity of the developer who produced the code and ensures the code has not been tampered with since the issue of its digital certificate.

Although the total number of signed malware samples includes stolen, purchased or abused certificates, the vast majority of growth is due to dubious CDNs. These are Web sites and companies that allow developers to upload their programs, or a URL that links to an external application, and wrap it in a signed installer.

Creating confusion

The McAfee Labs team warns that the growing number of maliciously signed files could create confusion among users and administrators, and even call into question the continued viability of the CA model for code signing.

"Although the expansion of the CA and CDN industries has dramatically lowered the cost of developing and issuing software for developers, the standards for qualifying the identity of the publisher have also decreased dramatically," says Weafer. "We will need to learn to place more trust in the reputation of the vendor that signed the file, and less trust in the simple presence of a certificate."

McAfee Labs collected 2.47 million new mobile samples in 2013, with 744 000 in the fourth quarter alone. Its mobile malware zoo of unique samples grew by an astounding 197% from the end of 2012, the vendor reveals.

The volume of new ransomware samples rose by one million for the year, doubling in number from Q4 2012 to Q4 2013, says McAfee, adding that it recorded a 70% increase in the number of suspect URLs in 2013.

In 2013, McAfee Labs found 200 new malware samples every minute, or more than three new threats every second.

Share