New malware dubbed ModPipe identified; targets Oracle PoS systems
- ESET researchers discovered a new ModPipe malware, a modular backdoor targeted at gaining sensitive information.
- Thousands of hospitals and hotels’ PoS system databases are at risk of decryption.
- The malware is attacking Oracle Micros Hospitality RES 3700 POS systems in modules.
The ESET researchers have warned against a new malware working as a modular backdoor. It functions to give intruders access to the sensitive information of Point-of-Sale (PoS) systems. The malicious software is dubbed ModPipe.
Primarily, cybersecurity researchers have warned both the hotel and hospital sectors to be wary of ModPipe.
RES 3700 is a popular hotel and a hospital management system used in the United States. This system helps in maintaining PoS, inventory, and labor management.
Basic components of ModPipe
The ESET research team identified these backdoor modules’ existence and discovered the malware’s ‘basic units.’ The necessary components perform in a sequential pattern;
- The initial dropper is consist of two famous binaries, 32-bit and 64-bit.
- Then comes the persistent loader, which loads the main module performing the core function.
- The networking module helps communicate with C&C.
- At last, downloadable modules add specified functionality to the backdoor, such as stealing the database passwords.
What makes this malware dangerous?
The researchers were able to track numerous downloadable modules. GetMicInfo, the most threatening module, helps steal database passwords, settings, and other crucial data. The algorithm decrypts the data from Windows registry values.
The wild downloadable modules that comprise custom algorithms can adjust accordingly. They slide into the PoS database system leaking the information. That’s what makes ModPipe a dangerous malware.
When the ModPipe malware breaches the PoS database, it can access status tables, system configuration, and transaction history.
Certain modules are not traced yet. Thus far, the researchers have discovered GetMicInfo, ModScan, and ProcList. While the remaining four are still to be identified.
Despite all this danger, the RES 3700 system’s encryption standards make it secure enough to hide the card information. ESET’s researchers believe that ModPipe, in its elemental state, is not that strong to access credit card numbers or expiry dates.
The researchers noted,
“The objective of the attacker remains unclear.”
The most important information on the PoS system is the card data, and to steal that; the attacker needs to have passphrase that is site-specific.
To access such sensitive information, this process needs to be executed into the module. It would then have to face the Windows Data Protection API (DPAPI), implemented automatically on to the targeted system.
The hotel sector hasn’t been targeted with PoS malware for the first time. In June 2016, a swathe of US hotels had fallen prey to PoS malware that reportedly exposed the financial data of customers. The data breach divulged data from tens of thousands of drinks, food, and other transactions.
About the author
Sam Walker is a tech-focused writer who has traveled the world but currently lives in Australia. He has a keen interest in digital privacy and security. Sam loves testing new technology and researching the latest security trends to keep others informed (and ultimately safe) online.