New malware program Punkey targets point-of-sale systems

All signs point to an increase in the number of memory scraping malware programs infecting PoS terminals to steal payment card data

Point-of-Sale (PoS) terminals have become an attractive target for hackers over the past year, reflected in the increasing number of RAM-scraping programs that steal payment card information from the memory of such systems.

Last month security researchers from Cisco Systems issued a warning about a new PoS threat dubbed PoSeidon and on Wednesday security blogger Brian Krebs reported that the program has already infected PoS terminals at restaurants, bars and hotels in the U.S.

Security researchers from Trustwave now warn that during a recent investigation with the U.S. Secret Service, they've uncovered yet another RAM-scraping PoS threat they've named Punkey.

This new malicious program, that has at least three variants, is very similar to another family of PoS malware known as NewPosThings. The similarities suggest the two families are based on the same source code, but Punkey has enough differences to make it unique.

Punkey has versions for both 32-bit and 64-bit Windows-based PoS terminals and in addition to stealing payment card data while it's being processed, it also installs a keylogger to capture what employees type on such systems.

The malware injects itself into the Windows explorer.exe process and creates registry start-up entries to ensure its persistence. It also drops a file called DLLx64.dll which is the keylogger component.

All payment card details and keystrokes captured by the malware are first encrypted with AES (Advanced Encryption Standard) and are then sent back to a command-and-control (C&C) server.

The malware can also download and execute other malicious files, including updates for itself.

"This gives Punkey the ability to run additional tools on the system such as executing additional reconnaissance tools or performing privilege escalation," the Trustwave researchers said in a blog post. "This is a rare feature for POS malware."

Trustwave created a tool that can decrypt Punkey traffic and published it on GitHub. This could help PoS terminal owners identify Punkey traffic on their networks.

In its annual Data Breach Investigations Report released this week, Verizon Enterprise Solutions noted a significant increase in the number of PoS RAM scraping attacks. In fact, PoS intrusions were one of the top three causes for confirmed data breaches last year according to the company.

The trend appears to have continued this year. Between PoSeidon last month and Punkey now, malware researchers also found other PoS malware threats: new variants of NewPosThings and a program called FighterPOS that infected over 100 organizations in Brazil.

Join the Good Gear Guide newsletter!

Error: Please check your email address.

Tags intrusiontrustwavesecurityVerizon Enterprise Solutionsdata breachmalware

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Lucian Constantin

IDG News Service
Show Comments

Most Popular Reviews

Latest News Articles


GGG Evaluation Team

Kathy Cassidy


First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni


For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell


The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi


The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott


My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?