![]() This means it is possible to modify POS software and let third-parties capture the transmitted data via the bank terminal. Kaspersky Lab researchers revealed that Prilex malware has remained active since 2014 its original function was to modify malware with exclusive features of infecting point-of-service (POS) terminals and obtaining card data. It is the first time a full suite of tools has been developed and extensively used for conducting fraud. ![]() Previously, Prilex was used to steal cash and payment card information from Brazilian ATMs and retailers. ![]() ![]() It is just another day with just another ATM malware targeting unsuspecting users – This time, the malware comes with cloning capabilities.Īccording to the findings of Kaspersky Lab researchers, an old point-of-sale malware program Prilex has now been transformed into a full-fledged tool suite that allows cyber-crooks steal PIN card and chip data for creating their own plastic cards to conduct frauds. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |