Nemesis Payment Card Malware 101

 Nemesis Payment Card Malware 101

Cyber criminals are continuously working on creating new malware in order to steal card details and other personal information, so financial institutions have to stay on top of their game when it comes to potential security breaches. Over the years, high profile businesses, including Home Depot and Target, have all been targeted by these cyber criminals. A new type of malware has recently been discovered, which the F1N1 calls Nemesis. We reveal the suspected group behind Nemesis and how it can penetrate the hard drive, plus we explain what can be done to safely remove Nemesis from personal devices. 

The F1N1 suggests that a suspected Russian group are behind this piece of malware, which has been used to target several large institutions that process payment transactions. This advanced piece of malware works by being installed on a lower-level operating system, which means that it can remain on a hard drive even if the operating system is reinstalled. The malware is a boot-kit, because it can be installed and executed independently of a Windows operating system, by accessing the computer's volume boot records and using code which alters the master boot record. Because the malware executes before the operating system is loaded, it remains undetected by antivirus products and by the integrity check that is completed by the operating system. 

In order to detect Nemesis you will need to have updated tools which scan for this type of malware. If Nemesis is detected, then wiping the operating system will not solve the problem. Instead a complete physical wipe of all devices, and then reinstallation of the operating system is required.
 

Date: 11 December 2015, 15:53 pm
Das könnte Sie ebenfalls interessieren: