TruShield is now Avertium! To learn more and see what's new, visit

PunkeyPOS Malware

Email Us- 877.583.2841 -Request A Demo

Use This Form To Have A TruShield Team Member Contact You With More Information.

[gravityform id="8" title="false" description="false" ajax="true"]

Use This Form To Contact TruShield Inc Directly. Or you can call us at: 877.583.2841. We will respond back as quickly as possible!

PunkeyPOS Malware

This is a security alert for all TruShield clients, the financial services industry, and the community as a whole. We have learned of a new variant of a point of sale malware (POS) that has been affecting around 200 terminals throughout the United States. This malware is known as PunkeyPOS and can steal credit card data.

About PunkeyPOS Malware

PunkeyPOS isn’t new and was discovered last year in April of 2015, and its name is based on the 80s sitcom Punky Brewster. This malware belongs to the NewPOSthings family of malware due to the similarity in its functionality. This new variant was discovered by accident from Panda Security’s PandaLabs unit. The PunkeyPOS malware can drop a keylogger to record keystrokes and is encrypted using AES, and then sends that data to the command and control server, to read the memory of the processes running on the system the malware uses RAMscraper.

This malware doesn’t discriminate when it comes to Windows operating system; it works on them all. This POS malware is installed in the POS terminal and steals some personal identifiable information from bank cards, including account numbers and other sensitive information.

The unique thing about the malware is that it has the capability to differentiate between card data and irrelevant information not about a card. The card data that is useful is taken from process memory and is then encrypted and stored on a remote web server as stated by Panda Security. The encryption of the information allows hiding from network monitoring tools. The information collected is later sold to thieves to clone for fraudulent use.

According to PandaLabs most employees are tricked into installing the malware via social engineering, but this is not the only tactic that can be used to download this malware.

Conclusion and Mitigation

POS malware continues to be a threat and is always evolving. That’s why it is important to have some safeguards in place to combats threats like these. The best practice against POS malware is to make sure that systems are always up to date. Make sure that a defense-in-depth approach is taken to mitigate the risk and other monitoring tools. Since social engineering is one the ways to infect a system, make sure all personnel are aware of these threats to help combat the risk of infection.



Download the PDF Version

Leave a reply

Copyright © 2018