Threat Database Trojans Trojan.POSRAM

Trojan.POSRAM

By GoldSparrow in Trojans

Threat Scorecard

Ranking: 2,871
Threat Level: 10 % (Normal)
Infected Computers: 5,880
First Seen: April 10, 2014
Last Seen: September 19, 2023
OS(es) Affected: Windows

Trojan.POSRAM is a threat tool that was part of the highly publicized attack on Target and other companies around the world. Trojan.POSRAM scrapes the infected computer's memory in order to obtain credit card data directly from the computers at the point of sale. After obtaining this information, Trojan.POSRAM sends it to a remote server where it may later be retrieved and used to pilfer money, carry out fraudulent purchases and operations and identity theft.

Trojan.POSRAM Gathers Sensitive Data from the PC's Memory

The Trojan.POSRAM's code is heavily based on BlackPOS, a similar threat infection that was developed in Russia last year. However, Trojan.POSRAM was designed in order to prevent detection from security programs. The main concern in the development of Trojan.POSRAM was the use of BlackPOS' memory scrubbing techniques, but to customize Trojan.POSRAM highly to ensure that Trojan.POSRAM would be nearly impossible to be detected. It is almost certain now that the threat that was used to attack Neiman Marcus and Target was based on BlackPOS, now known as Trojan.POSRAM.

It is important to note that Trojan.POSRAM was not entirely alone in these attacks. These sophisticated attacks also required a large number of different threat components to gain access to the compromised networks, stay on them undetected, and relay the stolen data to a remote server. Basically, Trojan.POSRAM's job is to monitor the portions of memory that are utilized by programs used in credit card payments in order to extract credit card data. Programs like Pos.exe and PosW32.exe extract and process the data in credit and debit card magnetic strips. Although this data is usually transmitted using secure channels, it may still be grabbed from memory with a threat like Trojan.POSRAM.

Even though Trojan.POSRAM is particularly sophisticated, the real complexity in this attack lies in the attackers' ability to orchestrate and coordinate the numerous components involved. By monitoring the time on the infected computers, third parties could then take the data extracted by Trojan.POSRAM and store it in a specific location. They could then use FTP to transfer it to their own servers for their own use.

Trending

Most Viewed

Loading...