We publish this weekly threat intelligence brief keep you informed on the latest security incidents and threats. For security news throughout the day, follow us on Twitter. Subscribe to our blog to stay up-to-date on findings from our analyst research reports!
“A pair of researchers demonstrated vulnerabilities in German banks and their retail payment systems that could allow cybercriminals to steal payment card information and more at the Chaos Communication Congress in Hamburg, Germany on Dec. 27. Researchers Karsten Nohl and Fabian Bräunlein of Security Research Labs in Berlin showed what they called “shopshifting” attacks that exploited the lack of authentication factors in the ZVT and Poseidon communication protocols used by the card readers that could allow an attacker to perform man-in-the-middle (MitM) style attacks through a retailer’s network via WI-FI or Ethernet connection.”
“Operation Black Atlas, a campaign aimed at infecting point of sale (PoS) systems around the world, has managed to infect more companies and is using the modular Gorynych/Diamond Fox botnet to exfiltrate data, Trend Micro researchers warn. Earlier this month, the security company revealed that cybercriminals were using multiple tools to compromise businesses that use card payment systems, including those in healthcare and retail, and to infect targeted systems with various PoS Malware: A generic term for a software that is designed to disable or otherwise damage computers, networks and computer systems LookingGlass Cyber (n) - another type of cold that can destroy a computer by latching on to destroy other programs., including the BlackPOS malware.”
– Security Week
“Microsoft has joined a growing list of technology firms that will inform users if they have been targeted by nation-state cyber snoops. The move was confirmed by Scott Charney, corporate vice president of trustworthy computing at Microsoft, who explained that the company will now warn users if an account has been “compromised” by a government or nation-state attacker.”