Chewbacca Malware

Chewbacca Malware

Security researchers have discovered that a piece of malware named after the Star Wars character Chewbacca has been used to steal payment card and personal information 49,000 payment cards stored by 45 retailers in 11 countries.

exc-5c512e967924e82726294624

Security researchers have discovered that a piece of malware named after the Star Wars character Chewbacca has been used to steal payment card and personal information 49,000 payment cards stored by 45 retailers in 11 countries.

Details from the payment cards were stolen from 24 million payment card transactions over two months, according to researchers from security company RSA.

The attack, which began on 25 October 2013, was mostly concentrated on US retailers, but the infection has also been detected in 10 other countries including Canada, Australia and Russia.

US retailer Target was recently the victim of a wide-scale security breach in its stores, when payment data relating to 40 million credit and debit cards, as well as 70 million customer records were stolen between 27 November and 15 December 2013.

Unsuspecting

In the Target case, cyber-criminals installed RAM scraper malware on Target’s point-of-sale (POS) cash register systems that was capable of stealing information directly from the memory of the computer system.

RSA has not revealed how the malware gets installed on the computer systems linked to the retailers’ cash registers, but it is typical that this malware is attached to phishing emails aimed at luring unsuspecting employees at these retailers into downloading and installing the software.

The ChewBacca malware contains a key-logger to record all keyboard inputs and windows that are opened on a victim’s PC, as well as a memory scanner that scans all the information being processed in the memory of the cash register’s computer system, looking for credit card payment details that are logged in the computer when the magnetic strip on the card is swiped (known as Track 1 and Track 2 data).

The malware then grabs the card number and logs it on the criminal’s server.

TOR Functionality

ChewBacca was first spotted by Kaspersky Lab researchers in December, but what makes this version of the malware unique is that it has added Tor functionality.

The private Tor network enables anonymous on-line communications and is often used by cyber-criminals to hide their IP addresses. The new variant of the ChewBacca malware installs a Tor client onto the victim’s computer system so that all traffic is hidden from the criminals’ server to the cash register.

According to Kaspersky, this malware is not currently being marketed by its creator for sale on underground forums.

“The ChewBacca Trojan appears to be a simple piece of malware that, despite its lack of sophistication and defence mechanisms, succeeded in stealing payment card information from several dozen retailers around the world in a little more than two months,” RSA said in the blog post.

“Retailers have a few choices against these attackers. They can increase staffing levels and develop leading-edge capabilities to detect and stop attackers (comprehensive monitoring and incident response), or they can encrypt or tokenise data at the point of capture and ensure that it is not in plaintext view on their networks, thereby shifting the risk and burden of protection to the card issuers and their payment processors.”
 

  • Recent Articles
Author Details
Founder & CEO at Hedgehog Security

Peter has been in the Information Security world since 1999 and in IT in general since 1996. His work history contains a unique blended balance between the development of exceptional technical capabilities and business knowledge. Peter is a proud father of twins and enjoys GT endurance racing on the weekends.

We would like to keep you informed about our services. Please tick the options below to receive occasional updates via

  • penetration testing steps
    Peter talks to FindMyUkCasino
  • Malware
    SB Tech Breach

    Last week saw SB Tech Breached by the hacking group Maze. It seems that every week the group are announcing more victims.  GameOn asked our CEO Peter Bassill, to give us some insight into the attack. The GameOn article is here.

  • Privacy
    Howto VPn

    In our “How to securely” series we asked our followers what tools they would like a simple guide on to help them stay secure online. There seemed to be a lot of confusion as to what a VPN is and why you should or should not use one. So we asked Peter to help.

  • WhatsApp
    How To Whatsapp Safely

    WhatsApp is among the fastest-growing instant messengers out there, and almost a social network in its own way. But if you are using it, there are some steps you should take to protect your security and privacy.

  • Morrisons Breach Update

    The UK’s highest court ruled that Morrisons can not be liable for a criminal act of a person seeking to harm their business. On April 1st, 2020, a panel of five justices unanimously ruled that Morrisons was not “vicariously liable”.

  • Remote Working Considerations

    With the current pandemic situation, we all need to be taking remote working considerations. While adjusting the work paradym, it is vital to keep a mind’s eye on the security and safety of the businesses information assets

  • Securing Zoom
    How To: Securing Zoom

    In this guide we are looking at how to go about securing zoom. Since the onset of the global pandemic, we have seen surge in “zoom bombing”. This is where people with malicious intent look for in-progress zoom meetings to join and cause trouble.

  • Software Security
    Dell EMC iDRAC memory corruption Vulnerability

    A critical vulnerabiltiy has been identified in Dell EMC iDRAC7, iDRAC8 and iDRAC9. Some unknown processing is affected by this issue. Manipulation with an unknown input can lead to stack based memory corruption.

  • Hiscox Sues for Failing to Disclose Data Breach

    On March 27th, Hiscox Insurance Company Inc. filed a complaint against law firm Warden Grier for concealing a data breach that occurred back in 2016.

  • Software Security
    Privilege escalation on Nginx Controller up to 3.1.x Controller API

    A critical vulnerability has been identified in Nginx Controller up to 3.1.x (web server,) affecting an unknown code block of the component Controller API.

Share on facebook
Facebook
Share on google
Google+
Share on twitter
Twitter
Share on linkedin
LinkedIn
Share on pinterest
Pinterest
Scroll to Top