AbaddonPOS

AbaddonPOS Description

In recent years, cybercriminals have been getting more and more inventive and expanding their operations. Such shady individuals have been taking more interest in PoS (Point-of-Sale) devices recently. It was widely believed that PoS devices were very secure, but the cybercriminals have come up with some cunning techniques to penetrate such machines. Attacks on PoS devices do not affect the business directly usually but siphons money from their customers instead. Needless to say, when the information about such an attack comes out, the business' reputation can be damaged gravely.

AbaddonPOS is a malware family, which targets businesses in the United States. It is believed that this threat originates from the TA530 hacking group. It is not known where the hackers are from, but they seem to attack businesses dealing with retail and hospitality in English speaking countries such as the United States, the United Kingdom and Australia mainly.

TA530 employ different methods in spreading AbaddonPOS, some of which will be exploit kits, Trojan downloaders, and emails containing corrupted attachments. When AbaddonPOS worms its way into a system, it will scan the running processes focusing on the ones that are dealing with the PoS device's software. To save time, AbaddonPOS is programmed to seek out number strings, which are likely to contain credit card information only – number strings starting with 3, 4, 5 or 6 and number strings longer than (or equal to) 13 and lesser than (or equal to) 19. Then, the numbers AbaddonPOS has picked out will be run through the Luhn algorithm, which is meant to confirm the validity of the data. Then, when confirmed, the data is encrypted using an XOR encryption algorithm and sent to the TA530's servers, which is hardcoded in the AbaddonPOS executable file that the researchers analyzed.

To make AbaddonPOS more difficult to detect and analyze, the attackers have applied checks to ensure that the malware is not being run in a controlled environment, as well as some obfuscated code that aims to make the lives of malware researchers a tad more difficult. However, their efforts were in vain as AbaddonPOS was studied thoroughly and anti-malware applications can detect and remove it without much fuss.

How Can You Detect Malware?

Download SpyHunter's Detection Scanner
to Detect Malware.
* SpyHunter's scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware removal tool to remove the malware threats. Read more on SpyHunter. If you no longer wish to have SpyHunter installed on your computer, follow these steps to uninstall SpyHunter.

Site Disclaimer

Enigmasoftware.com is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their PC with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your PC. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.

Leave a Reply

Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.