Warning issued over 'Backoff' point-of-sale malware

'Backoff' point-of-sale malware not currently detected by anti-virus software

The US Computer Emergency Response Team (US-CERT) has warned of new and potentially dangerous malware that is believed to have already infected some 600 retail businesses.

Known as Backoff, it first appeared in October 2013 and comes in at least three main variants. It can log keystrokes, scrape point-of-sale device memory for credit and debit card data and can send this data back to other nodes in a wider botnet. Finally, it injects a "malicious stub" into the Windows explorer.exe file.

"The malicious stub that is injected into explorer.exe is responsible for persistence in the event the malicious executable crashes or is forcefully stopped. The malware is responsible for scraping memory from running processes on the victim machine and searching for track data," warns the advisory.

It continues: "Keylogging functionality is also present in most recent variants of 'Backoff'. Additionally, the malware has a C2 component that is responsible for uploading discovered data, updating the malware, downloading/executing further malware, and uninstalling the malware."

The malware can expose customer data, including names, mailing addresses, payment card numbers, phone numbers and email addresses - all the basic ingredients for conducting identity theft.

Furthermore, the Backoff malware family is largely undetected in current anti-virus software, although signatures will be introduced soon. "Information security professionals recommend a defence in depth approach to mitigating risk to retail payment systems. While some of the risk mitigation recommendations are general in nature," states the advisory.

It also provides a precis of the retail system security strategies to minimise the risk of compromise:

Remote desktop access

Network security

Cash register and PoS security