hackers put payment card data security tool into arsenal
Last Updated : GMT 05:17:37
Emiratesvoice, emirates voice
Emiratesvoice, emirates voice
Last Updated : GMT 05:17:37
Emiratesvoice, emirates voice

Hackers put payment card data security tool into Arsenal

Emiratesvoice, emirates voice

Emiratesvoice, emirates voice Hackers put payment card data security tool into Arsenal

'Card Recon'
Tehran - FNA

Bootleg versions of a powerful tool called "Card Recon" from Ground Labs, which searches for payment card data stored in the nooks and crannies of networks, were appropriated by cybercriminals.
This month, the security companies Trend Micro and Arbor Networks published research into point-of-sale malware, which has been blamed for data breaches at retailers such as Target and Neiman Marcus, sparking concerns over the security of consumer data, Techworld reported.
Both companies found that unauthorized copies of Card Recon had been incorporated into a malware program and a toolkit designed for finding and attacking POS terminals.
"Card Recon looks to be a useful tool when wielded by an auditor or security staff, but it is clearly dangerous in the wrong hands," Arbor Networks wrote in its report.
Card Recon is intended for organizations seeking to comply with the Payment Card Industry's Data Security Standard (PCI-DSS), a set of recommendations to safeguard payment card data.
The software tool scans all parts of a network to see where payment card data is stored. Often, companies find card details stashed in unlikely and unknown places. Card Recon compiles a thorough report, and companies can then move to secure the data.
The software requires license authorization before it will run, which prevents direct illegitimate use, said Stephen Cavey, Ground Labs' co-founder and director of corporate development, via email. But it's impossible to restrict access to Card Recon's software executable after a genuine customer has obtained it.
More than 300 security auditors worldwide and thousands of merchant companies use Card Recon, he said.
"This is the unfortunate reality for all software vendors: It is common for criminals to acquire a copy of commercial software via unauthorized means and then reverse engineer that software to circumvent the licensing mechanisms that are designed to prevent its unauthorized use," Cavey said.
Numaan Huq, a senior threat researcher for Trend Micro, wrote on Wednesday that a version of Card Recon dating from three years ago was being used to validate payment card details in a type of POS malware.
When Card Recon is scanning, it has to be able to separate 16-digit numbers and other random data it finds from valid 16-digit credit card numbers. Credit card numbers can be validated by using a checksum formula called the Luhn algorithm.
The malware Huq studied used Card Recon to validate and identify cards by brands such as Discover, Visa and MasterCard. Using Card Recon was faster than other validation methods, especially for large volumes of card data, he wrote.
Arbor Networks wrote in its report that the attack toolkit it observed contained two cracked copies of Card Recon. In that instance, it appears Card Recon was being used for its intended purpose -- to find card numbers -- but for cybercriminals.
If anything, the abuse of Card Recon strengthens a case for its legitimate use. Ground Labs' Cavey said the best defense is to remove sensitive data.
"They can't steal what is no longer there," he said.

 

Name *

E-mail *

Comment Title*

Comment *

: Characters Left

Mandatory *

Terms of use

Publishing Terms: Not to offend the author, or to persons or sanctities or attacking religions or divine self. And stay away from sectarian and racial incitement and insults.

I agree with the Terms of Use

Security Code*

hackers put payment card data security tool into arsenal hackers put payment card data security tool into arsenal

 



Name *

E-mail *

Comment Title*

Comment *

: Characters Left

Mandatory *

Terms of use

Publishing Terms: Not to offend the author, or to persons or sanctities or attacking religions or divine self. And stay away from sectarian and racial incitement and insults.

I agree with the Terms of Use

Security Code*

hackers put payment card data security tool into arsenal hackers put payment card data security tool into arsenal

 



GMT 10:08 2018 Wednesday ,24 January

Microsoft to open 4 data centres

GMT 09:41 2017 Thursday ,17 August

Syrians face 'horrible' camp conditions

GMT 00:22 2017 Tuesday ,03 October

Palestinian PM vows to boost unity

GMT 16:30 2017 Wednesday ,15 November

Palestinian police concludes study visit to Portugal

GMT 10:15 2018 Monday ,15 January

India thrash Aussies in U19 World Cup

GMT 08:46 2017 Wednesday ,11 October

Turkey intensifies operation in Syria’s Idlib

GMT 18:36 2017 Thursday ,24 August

France's Macron sets sights on EU rule

GMT 16:33 2017 Monday ,27 November

Thousands flee over Bali volcano eruption fears

GMT 20:42 2014 Wednesday ,05 February

State TV delays scheduled address by Iran\'s Rouhani

GMT 15:47 2017 Tuesday ,16 May

PM receives USAID official

GMT 17:58 2011 Tuesday ,22 November

South Indian superstar Mammootty in Sharjah

GMT 16:24 2015 Monday ,23 March

Spain ruling party ran illegal slush fund

GMT 10:44 2011 Thursday ,22 September

Branson campaigning to save sharks

GMT 02:14 2017 Friday ,17 March

Mohamed bin Zayed receives Bahrain Crown Prince
 
 Emirates Voice Facebook,emirates voice facebook  Emirates Voice Twitter,emirates voice twitter Emirates Voice Rss,emirates voice rss  Emirates Voice Youtube,emirates voice youtube  Emirates Voice Youtube,emirates voice youtube

Maintained and developed by Arabs Today Group SAL.
All rights reserved to Arab Today Media Group 2025 ©

Maintained and developed by Arabs Today Group SAL.
All rights reserved to Arab Today Media Group 2025 ©

emiratesvoieen emiratesvoiceen emiratesvoiceen emiratesvoiceen
emiratesvoice emiratesvoice emiratesvoice
emiratesvoice
بناية النخيل - رأس النبع _ خلف السفارة الفرنسية _بيروت - لبنان
emiratesvoice, Emiratesvoice, Emiratesvoice