New Revolutionary Tool to Protect Malware Infected Merchants
LOS ANGELES, May 23, 2014 /PRNewswire/ — IntelCrawler LLC (www.intelcrawler.com) has released a new tool that helps merchants combat the Point-of-Sale infections that have recently compromised payment card data at large retailers like Target, Nieman Marcus, Michael’s and many others.
The tool consists of a feed of aggregated data and intelligence of infected hosts, merchants, IP addresses of compromised terminals and additional information for fraud prevention. The feed can be delivered through a secure customers’ portal or encrypted e-mail notifications in various formats (XML, JSON, CVS, RAW).
IntelCrawler’s underground investigations of Point-of-Sales related e-Crimes has produced some unique intelligence about the distribution of malware targeting RAM Scrapping, such as Alina, BlackPOS, Dexter, JackPOS, VSkimmer and their respective modifications and variants.
Some recent uncovered compromised POS terminals were in the vertical markets of accounting systems and grocery management platforms. These attacks revealed over1478 infected hosts from Argentina, Australia, Austria, Bangladesh, Belgium, Brazil, Canada, Chile, China, Czech Republic, Denmark, Estonia, France, Germany, Hong Kong, India, Indonesia, Israel, Italy, Japan, Mexico, Netherlands, New Zealand, Poland, Portugal, Russian Federation, South Africa, Spain, Switzerland, Taiwan, Turkey, UK, USA, Uruguay, Venezuela and Zambia.
Some part of this data is illustrated on the IntelCrawler POS Malware Infection Map (PMIM) with some details of the approximate number of compromised credit cards, geographies, and IP addresses of identified infected network hosts.
IntelCrawler’s feed is structured for helping protect payment card data at merchants, processors, acquiring banks, and assisting PCI DSS vendors. It is also a part of IntelCrawler’s Anti-Money Laundering (AML) and Fraud Intelligence product, which is a block of services targeting comprehensive analysis of potential risks to financial institutions, insurance companies, investments groups, private companies and corporations with respect to money laundering and fraud risks.
IntelCrawler is a cyber threat intelligence firm based in Los Angeles, California, which helps connect the dots between verified cyber intelligence information and emerging threats against specific enterprises using aggregated and analyzed large volumes of Big Data. It acts as a multi-tier intelligence aggregator, which gathers information and cyber prints from a starting big data pool of over 3,000,000,000 IPv4 and over 200,000,000 domain names, which are scanned for analytics and dissemination to drill down to a desired result. The finite pool of cyber prints is then narrowed further by comparing it to various databases and forum intelligence gathered from the underground and networked security company contacts. The final result could be the location of a particular keyboard or a computer housing the threat.