词条 | Backoff |
释义 |
OperationBackoff malware injects the malicious stub into the explorer.exe file to gain access to the POS machines and it scrapes the victim's machine memory from running the processes.[7] It searches this memory for leftover credit card data after a payment card has been swiped.[8] Cybercriminals have mutated different variants of Backoff while some of the variants are equipped with keylogging functionality.[9] Some of the Backoff variants have C2 component which helps the malware to upload the victim's personal data, download the malware onto the victim POS machine and to uninstall the malware.[10] IncidentsBackoff Malware was aggressive and about 16.2% been infected in the third quarter of 2014. The survey by Department of Homeland Security(DHS) states that about thousands of businesses have been infected by Backoff POS Malware.[11] Network security company Damballa records a 57 percent infection increase from Backoff malware during August 2014.[12] Big companies like Home Depot, Target and Dairy Queen suffered from backoff infection and many more smaller companies may be infected. See also
References1. ^{{cite web|url=https://www.us-cert.gov/ncas/alerts/TA14-212A|title=About Backoff Malware|last=|first=|date=31 July 2014|website=US-CERT|archive-url=|archive-date=|dead-url=|accessdate=2014-07-31}} {{Malware}}{{Software distribution}}{{malware-stub}}2. ^{{cite web|url=https://securebox.comodo.com/pos-system/backoff-malware|title=Backoff Malware complete overview|last=|first=|date=|website=Comodo|archive-url=|archive-date=|dead-url=|accessdate=2014-07-31}} 3. ^{{cite web|url=https://www.forbes.com/sites/jameslyne/2014/08/26/backoff-malware-hits-1000-businesses-credit-card-machines-and-target/#2515c7ea5af4|title=Backoff malware hits credit card machines|last=Lyne|first=James|date=26 August 2014|website=Forbes|archive-url=|archive-date=|dead-url=no|accessdate=2014-08-26}} 4. ^{{cite web | url=http://whatis.techtarget.com/definition/Backoff |title= Backoff Malware used by Cybercriminals }} 5. ^{{cite web | url=http://www.tripwire.com/state-of-security/incident-detection/backoff-pos-malware-are-you-infected-and-dont-know-it/ |title= Backoff malware-WHAT IS IT?|accessdate= 2014-08-26 }} 6. ^{{cite web|url=http://static1.squarespace.com/static/555fc02fe4b0767a7f081cfa/t/5615b66ee4b065af7af69daf/1444263534871/wp-Backoff+Analysis+White+Paper+2014+V3.pdf|title=Memory Scrapping malware – Biggest Threat To the Retail|last=|first=|date=|website=|publisher=Stormshield|format=PDF|archive-url=https://web.archive.org/web/20160820181909/http://static1.squarespace.com/static/555fc02fe4b0767a7f081cfa/t/5615b66ee4b065af7af69daf/1444263534871/wp-Backoff+Analysis+White+Paper+2014+V3.pdf|archive-date=20 August 2016|dead-url=yes|accessdate=2014-01-03}} 7. ^{{cite web|url=http://info.rippleshot.com/blog/backoff-point-sale-malware-need-know|title="Backoff" Point-of-Sale Malware: What You Need To Know|last=Walker|first=Zach|date=8 September 2014|website=Rippleshot|archive-url=https://web.archive.org/web/20141031231831/http://info.rippleshot.com/blog/backoff-point-sale-malware-need-know|archive-date=31 October 2014|dead-url=no|accessdate=2014-09-08}} 8. ^{{cite web|url=http://www.pcworld.com/article/2838732/the-backoff-malware-linked-to-data-breaches-is-spreading.html|title=The 'Backoff' malware used in retail data breaches is spreading {{!}} PCWorld|last=Kirk|first=Jeremy|date=24 October 2014|website=PC World|archive-url=https://web.archive.org/web/20141026162236/https://www.pcworld.com/article/2838732/the-backoff-malware-linked-to-data-breaches-is-spreading.html|archive-date=26 October 2014|dead-url=no|access-date=}} 9. ^{{cite web|url=http://www.scmagazine.com/new-version-of-backoff-detected-malware-variant-dubbed-rom/article/381054/|title=New version of Backoff detected, malware variant dubbed 'ROM' - SC Magazine|last=Walker|first=Danielle|date=3 November 2014|website=SC Magazine|archive-url=https://web.archive.org/web/20141110094754/http://www.scmagazine.com/new-version-of-backoff-detected-malware-variant-dubbed-rom/article/381054/|archive-date=10 November 2014|dead-url=yes|accessdate=2014-11-03}} 10. ^{{cite web|url=http://www.bankinfosecurity.in/pos-malware-still-works-a-8044|title=Why POS Malware Still Works - BankInfoSecurity|last=Schwartz|first=Mathew J.|date=6 April 2015|website=BankInfoSecurity|publisher=Information Security Media Group|archive-url=https://web.archive.org/web/20160318102355/http://www.bankinfosecurity.in/pos-malware-still-works-a-8044|archive-date=18 March 2016|dead-url=no|accessdate=2015-04-06}} 11. ^{{cite web|url=http://www.cse.wustl.edu/~jain/cse571-14/ftp/pos_security/index.html|title=A Survey of Point-of-Sale (POS) Malware|last=Sun|first=Bowen|date=15 December 2014|website=|archive-url=|archive-date=|dead-url=|access-date=}} 12. ^{{cite web|url=https://www.damballa.com/q3-state-infections-report-reveals-57-increase-backoff-malware-august-september/|title=Q3 State of Infections Report Reveals 57% Increase in Backoff Malware from August to September - Damballa|last=|first=|date=24 October 2014|website=Damballa|archive-url=https://web.archive.org/web/20170224131653/https://www.damballa.com/q3-state-infections-report-reveals-57-increase-backoff-malware-august-september/|archive-date=24 February 2017|dead-url=yes|accessdate=23 February 2017}} 4 : 2014 in computer science|Computer viruses|Cyberwarfare|Banking technology |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。