Payment card data was stolen during the past three months from several dozen retailers that had their point-of-sale systems infected with a memory-scraping malware program called ChewBacca.
The cyber criminal operation was investigated by antifraud researchers from RSA, the security division of EMC, who analyzed the malware and its command-and-control infrastructure.
[ Also on InfoWorld: Target says attackers used stolen vendor credentials to gain access. | Learn how to greatly reduce the threat of malicious attacks with InfoWorld's Insider Threat Deep Dive PDF special report. | Stay up to date on the latest security developments with InfoWorld's Security Central newsletter. ]
Most of the affected retailers are based in the U.S., but PoS infections with this malware were also detected in 10 other countries, including Russia, Canada and Australia, the RSA researchers said Thursday in a blog post.
"At this time our research indicates that 119 PoS terminals within 45 unique retailers show evidence of being infected with the ChewBacca malware," said Uri Fleyder, manager of the Cybercrime Research Lab at RSA, via email. Thirty-two of the affected retailers are based in the U.S., he said.
According to Fleyder, the ChewBacca gang infected PoS terminals located in different stores around the country and there are indications that over 50,000 unique payment cards have been compromised, including the data encoded on their magnetic strips that's captured when they're swiped at PoS terminals. This is called track 1 and track 2 data.
Fleyder declined to comment on the identities of the compromised retailers, but said the evidence is being shared with them and they're being advised to report the information to their local law enforcement authorities.
The ChewBacca malware was first documented by researchers from antivirus firm Kaspersky Lab in a December blog post. One of its most interesting features, aside from stealing payment card data from the RAM memory of PoS systems, is that it communicates with a command-and-control server over the Tor anonymity network.
The malware installs a Tor proxy client on the infected systems and connects to a server via a .onion address. The .onion pseudo-TLD is used by services that can only be accessed from within the Tor network.
The malware enumerates all processes running on the infected system and extracts information from their memory that matches specific patterns, the Kaspersky researchers said in their December report.
The type of data targeted by the malware was not specified at the time, but according to Marco Preuss, director of Kaspersky's Global Research and Analysis Team in Europe, the company's researchers suspected that it might be financial in nature. However, this was just speculation, so it wasn't mentioned in the report, he said Thursday via email.
According to the RSA researchers, the malware has been in use since Oct. 25.