Proofpoint researchers have recently unearthed a notorious Point-of-Sale malware ‘ScanPOS’ that is targeting retailers worldwide, especially the hospitality sector.
The malware drop is facilitated by several large email campaigns, each with tens of thousands of messages. These messages distribute the Kronos banking trojan, which acts as a loader for the ScanPOS as a secondary payload.
The emails include an attachment or a link to a domain that's under hacker control, but masquerades as Microsoft SharePoint. Clicking the link causes the user to download malicious content.
Proofpoint says that banking trojans and malware are continuing to evolve, even as older campaigns have been replaced largely by ransomware and other payloads.
The Kronos banker malware has experienced an increase in activity thanks to the ScanPOS campaign, the company says.
The ScanPOS malware is also targeting a range of sectors including higher education, financial services, healthcare and entertainment.
Proofpoint says that during holiday or festival shopping season, organisations should be especially vigilant about malware that may be used to exploit seasonal trends and ensure strong cyber security practices.
The company says it will continue to monitor Kronos, ScanPOS distribution and other malware threats as they appear.