Rather
than targeting thousands of individual machines through traditional
Trojans
or phishing emails, the custom-made malware targets specific POS
systems. The malware
injects itself into the file iexplore.exe in Windows
servers before hijacking
process lists, stays active through rewriting in the
registry key, and then
scrapes sensitive credit card data from the server --
before transferring it
through a remote command and control (C&C) system.
Contents contributed and discussions participated by Catherine Gibson
1More
HowStuffWorks "Are hotels going green?" - 0 views
4More
HowStuffWorks "Are hotels going green?" - 0 views
2More
GDS Will Evolve Into 'Value Creation Hubs,' Harteveldt Says - 0 views
1More
The Future of Hospitality Hangs in Balance of Mobile and Social Implementation | Top St... - 0 views
1 - 8 of 8
Showing 20▼ items per page