Memory scraping malware targets Oracle Micros point-of-sale customers

A new threat dubbed MalumPoS is being used against businesses in the hospitality, food and retail industries, researchers said

Attackers infect point-of-sale terminals with malware

Attackers infect point-of-sale terminals with malware

A new malware program designed to steal payment card details from point-of-sale (PoS) systems is targeting businesses using Oracle Micros products.

Micros, which was acquired by Oracle last year, develops front and back office customer service systems that are popular in the hospitality, food and retail industries. Its technology is used at over 330,000 customer sites in 180 countries, according to the company.

Security researchers from antivirus firm Trend Micro recently came across a highly configurable memory scraping malware program that they dubbed MalumPoS.

This kind of program monitors the memory of other processes for payment card track data -- the information that's encoded on the magnetic stripe of payment cards and which can be used to clone them.

The MalumPoS samples identified by Trend Micro look for such data in the memory of processes associated with Oracle Micros technology, a transaction gateway application from Shift4, Web-based PoS systems accessed through Internet Explorer and Oracle Forms, a tool for accessing data in Oracle databases.

"Looking at the user base of these listed platforms, we can see that a major chunk is from the U.S.," the Trend Micro researchers said Friday in a blog post.

When it infects a system, MalumPoS installs itself as a service called NVIDIA Display Driv3r. It then uses regular expressions to detect track data for Visa, MasterCard, American Express, Discover, and Diner's Club cards.

The malware is configurable and can technically monitor up to 100 different processes at the same time, the Trend Micro researchers said. So, in the future, attackers might add other PoS systems and applications that handle card data to its target list, they said.

The number of memory scraping PoS malware programs have increased over the past several years and they appear to be the weapon of choice for cybercriminals looking to steal payment card data. Such programs played a big role in some of the largest card breaches to date, including those at Target and Home Depot.

There are multiple ways in which PoS terminals get infected with this kind of malware, the most common one being through weak remote access credentials. That's because these systems are often configured to receive remote technical support, sometimes through insecure technology.

In other cases attackers first compromise other computers on the same internal network where the PoS terminals are located and then use stolen administrative credentials or exploits for unpatched vulnerabilities to install malware on them.

Join the Good Gear Guide newsletter!

Error: Please check your email address.

Tags intrusiontrend microsecuritydata breachAccess control and authenticationmalwareOracleShift4

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Lucian Constantin

IDG News Service
Show Comments

Most Popular Reviews

Latest News Articles


GGG Evaluation Team

Kathy Cassidy


First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni


For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell


The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi


The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott


My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?