{"id":48923,"date":"2017-04-11T09:00:24","date_gmt":"2017-04-11T01:00:24","guid":{"rendered":"https:\/\/blog.trendmicro.com.tw\/?p=48923"},"modified":"2017-04-03T23:03:14","modified_gmt":"2017-04-03T15:03:14","slug":"majikpos-%e6%94%bb%e6%93%8a%e6%89%8b%e6%b3%95%e7%b5%90%e5%90%88%e4%ba%86%e9%8a%b7%e5%94%ae%e6%ab%83%e5%8f%b0%e7%b3%bb%e7%b5%b1-pos-%e6%83%a1%e6%84%8f%e7%a8%8b%e5%bc%8f%e8%88%87%e9%81%a0%e7%ab%af","status":"publish","type":"post","link":"https:\/\/blog.trendmicro.com.tw\/?p=48923","title":{"rendered":"MajikPOS \u653b\u64ca\u624b\u6cd5\u7d50\u5408\u4e86\u92b7\u552e\u6ac3\u53f0\u7cfb\u7d71 (PoS) \u60e1\u610f\u7a0b\u5f0f\u8207\u9060\u7aef\u5b58\u53d6\u6728\u99ac\u7a0b\u5f0f (RAT)"},"content":{"rendered":"<h1><a href=\"https:\/\/blog.trendmicro.com.tw\/?attachment_id=11637\" rel=\"attachment wp-att-11637\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-11637\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2015\/03\/POS2-300x300.png\" width=\"350\" height=\"350\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2015\/03\/POS2-300x300.png 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2015\/03\/POS2-150x150.png 150w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2015\/03\/POS2-768x768.png 768w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2015\/03\/POS2-600x600.png 600w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2015\/03\/POS2.png 800w\" sizes=\"(max-width: 350px) 100vw, 350px\" \/><\/a><\/h1>\n<p><a href=\"https:\/\/www.trendmicro.com.tw\/edm\/Tracking.asp?id=2651&amp;name=20110916\">\u8da8\u52e2\u79d1\u6280<\/a>\u767c\u73fe\u4e86\u4e00\u500b\u65b0\u7684\u00a0<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/PoS-(point-of-sale)-malware\">\u92b7\u552e\u6ac3\u53f0\u7cfb\u7d71 (PoS) \u60e1\u610f\u7a0b\u5f0f<\/a>\u54c1\u7a2e\uff1aMajikPOS (\u8da8\u52e2\u79d1\u6280\u547d\u540d\u70ba\uff1aTSPY_MAJIKPOS.A)\uff0c\u548c\u8a31\u591a\u5176\u4ed6 PoS \u60e1\u610f\u7a0b\u5f0f\u4e00\u6a23\u662f\u5c08\u70ba\u7aca\u53d6\u8cc7\u8a0a\u800c\u8a2d\u8a08\uff0c\u4f46\u5176\u6a21\u7d44\u5316\u7684\u57f7\u884c\u65b9\u5f0f\u537b\u76f8\u7576\u7368\u7279\u3002\u6211\u5011\u4f30\u8a08 MajikPOS \u7684\u7b2c\u4e00\u500b\u611f\u67d3\u6848\u4f8b\u61c9\u8a72\u51fa\u73fe\u5728 2017 \u5e74 1 \u6708 28 \u65e5\u5de6\u53f3\u3002<\/p>\n<p>\u96d6\u7136\u5176\u4ed6\u7684 PoS \u60e1\u610f\u7a0b\u5f0f\uff0c\u5982\uff1a<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/fastpos-updates-in-time-for-retail-sale-season\/\">FastPOS<\/a> (\u65b0\u7248)\u3001<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/operation-black-atlas-part-2-tools-and-malware-used-and-how-to-detect-them\/\">Gorynych<\/a> \u53ca \u00a0<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/operation-black-atlas-endangers-in-store-card-payments-and-smbs-worldwide-switches-between-blackpos-and-other-tools\/\">ModPOS<\/a>\u00a0 \u4e5f\u63a1\u7528\u4e86\u5143\u4ef6\u5316\u7684\u8a2d\u8a08\u4f86\u5206\u64d4\u5404\u7a2e\u4e0d\u540c\u529f\u80fd (\u5982\u9375\u76e4\u5074\u9304)\uff0c\u4f46 MajikPOS \u7684\u6a21\u7d44\u5316\u65b9\u5f0f\u7a0d\u6709\u4e0d\u540c\u3002MajikPOS \u53ea\u9700\u518d\u5f9e\u4f3a\u670d\u5668\u4e0b\u8f09\u53e6\u4e00\u500b\u5143\u4ef6\u5c31\u6709\u80fd\u529b\u64f7\u53d6\u7cfb\u7d71\u8a18\u61b6\u9ad4 (RAM) \u5167\u7684\u8cc7\u6599\u3002<\/p>\n<p>MajikPOS \u662f\u6839\u64da\u6b79\u5f92\u6240\u4f7f\u7528\u7684\u5e55\u5f8c\u64cd\u7e31 (C&amp;C) \u9762\u677f\u800c\u547d\u540d\uff0c\u8a72\u9762\u677f\u662f\u7528\u4f86\u767c\u9001\u6307\u4ee4\u4e26\u50b3\u9001\u7aca\u53d6\u5230\u7684\u8cc7\u6599\u3002MajikPOS \u5e55\u5f8c\u7684\u99ed\u5ba2\u5728\u653b\u64ca\u6642\u7d50\u5408\u4e86 PoS \u60e1\u610f\u7a0b\u5f0f\u548c\u9060\u7aef\u9059\u63a7\u6728\u99ac\u7a0b\u5f0f (RAT)\uff0c\u53ef\u9020\u6210\u56b4\u91cd\u7684\u50b7\u5bb3\u3002\u5f9e MajikPOS \u53ef\u770b\u51fa<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/predictions\/2017\">\u6b79\u5f92\u7684\u624b\u6cd5\u8d8a\u4f86\u8d8a\u8907\u96dc<\/a>\uff0c\u8b93\u50b3\u7d71\u7684\u9632\u79a6\u986f\u5f97\u6beb\u7121\u62db\u67b6\u4e4b\u529b\u3002<\/p>\n<p><em><strong>\u5165\u4fb5\u9ede\u8207\u653b\u64ca\u904e\u7a0b<\/strong><\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com.tw\/edm\/Tracking.asp?id=2651&amp;name=20110916\">\u8da8\u52e2\u79d1\u6280<\/a>\u5f9e <a href=\"https:\/\/www.trendmicro.com\/en_ca\/business\/technologies\/smart-protection-network.html\">Smart Protection Network\u2122<\/a> \u6240\u5f97\u5230\u7684\u8cc7\u6599\u53ef\u4ee5\u5224\u65b7\u51fa\u6b79\u5f92\u4f7f\u7528\u4ec0\u9ebc\u65b9\u6cd5\u5f9e\u9060\u7aef\u5b58\u53d6\u53d7\u5bb3\u8005\u7684\u7aef\u9ede\uff0c\u90a3\u5c31\u662f\uff1aVirtual Network Computing (VNC) \u548c Remote Desktop Protocol (RDP) \u5169\u7a2e\u9060\u7aef\u652f\u63f4\u5de5\u5177\uff0c\u4e0d\u904e\u6b79\u5f92\u9084\u5fc5\u9808\u731c\u51fa\u53d7\u5bb3\u8005\u7684\u9060\u7aef\u5e33\u865f\u5bc6\u78bc\uff0c\u7136\u5f8c\u518d\u642d\u914d\u5148\u524d\u5b89\u88dd\u5728\u7cfb\u7d71\u4e0a\u7684 RAT \u5de5\u5177\u3002<!--more--><\/p>\n<p>\u99ed\u5ba2\u5148\u627e\u5230\u7cfb\u7d71\u4e0a\u5b89\u88dd\u6709 VNC \u8edf\u9ad4\u6216\u5df2\u958b\u555f RDP \u9060\u7aef\u684c\u9762\u7684\u7aef\u9ede\u88dd\u7f6e\uff0c\u63a5\u8457\u8a66\u5716\u5229\u7528\u4e00\u822c\u5e38\u898b\u7684\u5e33\u865f\u5bc6\u78bc\u7d44\u5408\uff0c\u6216\u8005\u5229\u7528\u66b4\u529b\u7834\u89e3\u65b9\u5f0f\u4f86\u731c\u51fa\u5bc6\u78bc\uff0c\u8b93\u4ed6\u5011\u53ef\u4ee5\u9032\u5165\u7cfb\u7d71\u3002\u6211\u5011\u6240\u898b\u5230\u7684 MajikPOS \u653b\u64ca\u6848\u4f8b\u6709\u4e00\u500b\u5171\u540c\u9ede\u5c31\u662f\u5b83\u5011\u7684\u611f\u67d3\u6642\u9593\u63a5\u8fd1\u3002\u5176 RAT \u5de5\u5177\u5b89\u88dd\u5728\u7aef\u9ede\u4e0a\u7684\u6642\u9593\u5927\u7d04\u4ecb\u65bc 2016 \u5e74 8 \u6708\u81f3 11 \u6708\u4e4b\u9593\u3002<\/p>\n<p>\u6b79\u5f92\u4e00\u65e6\u9032\u5165\u4ed6\u5011\u53ef\u653b\u64ca\u7684\u7aef\u9ede\u88dd\u7f6e\uff0c\u5c31\u6703\u900f\u904e VNC\u3001RDP\u3001RAT\u3001FTP \u4ee5\u53ca\u67d0\u500b\u7279\u6b8a\u7248\u672c\u7684 Ammyy Admin (\u4e00\u500b\u5546\u7528\u9060\u7aef\u7ba1\u7406\u8edf\u9ad4) \u76f4\u63a5\u5f9e\u67d0\u500b\u514d\u8cbb\u7684\u7db2\u8def\u5132\u5b58\u7a7a\u9593\u4e0b\u8f09 MajikPOS \u60e1\u610f\u7a0b\u5f0f\u5b89\u88dd\u5230\u7cfb\u7d71\u4e0a\u3002\u4e0d\u904e\u6b79\u5f92\u5728\u4f7f\u7528 Ammyy Admin \u6642\u53ea\u7528\u5230\u5176\u6a94\u6848\u7ba1\u7406\u529f\u80fd\uff0c\u9019\u500b\u7279\u6b8a\u7684\u7248\u672c\u53ef\u80fd\u7684\u6a94\u540d\u662f\uff1a<em>VNC_Server.exe<\/em> \u6216 <em>Remote.exe<\/em>\u3002<\/p>\n<p><em><strong>\u7d44\u614b\u8a2d\u5b9a\u8207 C&amp;C \u901a\u8a0a<\/strong><\/em><\/p>\n<p>MajikPOS \u6703\u8207\u5e55\u5f8c\u7684 C&amp;C \u4f3a\u670d\u5668\u9023\u7dda\u767b\u8a18\u88ab\u611f\u67d3\u7684\u7cfb\u7d71\u3002\u767b\u8a18\u597d\u4e4b\u5f8c\uff0c\u4f3a\u670d\u5668\u5c31\u6703\u767c\u9001\u4e00\u4efd\u300c\u7d44\u614b\u8a2d\u5b9a\u300d\u7d66\u88ab\u611f\u67d3\u7684\u88dd\u7f6e\uff0c\u88e1\u9762\u542b\u6709\u5f8c\u7e8c\u6b65\u9a5f\u6240\u7528\u5230\u7684\u4e09\u9805\u91cd\u8981\u8cc7\u6599\u3002<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/files\/2017\/03\/majikpos-1.png\" width=\"819\" height=\"96\" \/><br \/>\n<em>\u5716 1\uff1aC&amp;C \u4f3a\u670d\u5668\u5728\u767b\u8a18\u597d\u88dd\u7f6e\u4e4b\u5f8c\u56de\u50b3\u7d44\u614b\u8a2d\u5b9a\u8cc7\u6599\u3002<\/em><\/p>\n<p>\u9019\u4e9b C&amp;C \u4f3a\u670d\u5668\u7684\u5e55\u5f8c\u64cd\u7e31\u9762\u677f\u5c31\u53eb\u505a\u300cMagic Panel\u300d\uff0c\u5982\u4e0b\u5716\u6240\u793a\uff1a<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/files\/2017\/03\/majikpos-2.png\" width=\"846\" height=\"493\" \/><br \/>\n<em>\u5716 2\uff1aMagic Panel \u767b\u5165\u9801\u9762\u3002<\/em><\/p>\n<p><em><strong>\u64f7\u53d6\u8a18\u61b6\u9ad4\u5167\u5bb9<\/strong><\/em><\/p>\n<p><em>Conhost.exe<\/em> \u662f\u8ca0\u8cac\u64f7\u53d6\u8a18\u61b6\u9ad4\u5167\u5bb9\u4ee5\u8490\u96c6\u53d7\u5bb3\u96fb\u8166\u4fe1\u7528\u5361\u8cc7\u6599\u7684\u5143\u4ef6\uff0c\u5b83\u6703\u7528\u5230\u524d\u8ff0\u7684\u8a2d\u5b9a\u6a94\u6848\u3002<\/p>\n<p>MajikPOS \u53ef\u8490\u96c6\u7684\u4fe1\u7528\u5361\u7a2e\u985e\u7e41\u591a\uff0c\u5305\u62ec\uff1aAmerican Express\u3001Diners Club\u3001Discover\u3001Maestro\u3001Mastercard \u53ca Visa\u3002\u5b83\u5728\u78ba\u8a8d\u904e\u4fe1\u7528\u5361\u78c1\u689d\u8cc7\u6599\u4e4b\u5f8c\uff0c\u5c31\u6703\u5229\u7528\u300cHTTP POST, Action=\u201dbin\u201d\u300d\u6307\u4ee4\u5c07\u8cc7\u6599\u50b3\u9001\u81f3 C&amp;C \u4f3a\u670d\u5668\u3002<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/files\/2017\/03\/majikpos-3.png\" width=\"1213\" height=\"493\" \/><\/p>\n<p><em>\u5716 3\uff1aMagic Dump \u5546\u5e97\u4e0a\u8ca9\u8ce3\u6b79\u5f92\u5077\u4f86\u7684\u4fe1\u7528\u5361\u8cc7\u6599\u3002<\/em><\/p>\n<p><em><strong>\u5c08\u9580\u8ca9\u8ce3\u5931\u7aca\u4fe1\u7528\u5361\u8cc7\u6599\u7684\u7db2\u8def\u5546\u5e97<\/strong><\/em><\/p>\n<p>\u6211\u5011\u99ed\u5165\u4e86\u67d0\u53f0 MajikPOS \u7684 C&amp;C \u4f3a\u670d\u5668 (umbpan.xyz) \u4e4b\u5f8c\u767c\u73fe\u6709\u66f4\u591a\u7531\u540c\u4e00\u6b79\u5f92\u6240\u8a3b\u518a\u7684\u7db2\u7ad9\uff0c\u5176\u4e2d\u4e00\u500b\u662f\u53e6\u4e00\u500b Magic Panel \u7db2\u7ad9\uff0c\u5176\u9918\u7684\u5247\u662f\u300cMagic Dump\u300d\u5546\u5e97\uff0c\u9019\u4e9b\u662f\u6b79\u5f92\u5c08\u9580\u7528\u4f86\u8ca9\u8ce3\u5176\u5077\u7aca\u4e4b\u4fe1\u7528\u5361\u8cc7\u6599\u7684\u7db2\u7ad9\u3002<\/p>\n<p>\u9019\u4e9b\u5546\u5e97\u76ee\u524d\u5927\u7d04\u6709 23,400 \u7b46\u4fe1\u7528\u5361\u78c1\u689d\u8cc7\u6599\uff0c\u552e\u50f9\u5f9e\u6bcf\u7b46 9 \u7f8e\u5143\u81f3 39 \u7f8e\u5143\u4e0d\u7b49\uff0c\u8996\u4fe1\u7528\u5361\u800c\u5b9a\u3002\u5546\u5e97\u4e5f\u63d0\u4f9b\u4e86\u5927\u91cf\u8cfc\u8cb7\u512a\u60e0\uff0c\u4e00\u6b21\u8cfc\u8cb7 25 \u7b46\u300150 \u7b46\u548c 100 \u7b46\u7684\u50f9\u683c\u5206\u5225\u70ba 250 \u7f8e\u5143\u3001400 \u7f8e\u5143 \u548c 700 \u7f8e\u5143\u3002\u65e9\u5728 2017 \u5e74 2 \u6708\u6642\u5c31\u66fe\u7d93\u51fa\u73fe\u4e00\u540d\u53eb\u505a\u300cMagicDumps\u300d\u7684\u4f7f\u7528\u8005\u5728\u4fe1\u7528\u5361\u8cc7\u6599\u5730\u4e0b\u8ad6\u58c7\u4e0a\u520a\u767b\u904e\u9019\u4e9b\u7db2\u7ad9\u7684\u5ee3\u544a\uff0c\u800c\u4e14\u8a72\u540d\u4f7f\u7528\u8005\u4e00\u76f4\u5728\u6301\u7e8c\u66f4\u65b0\u4fe1\u7528\u5361\u8cc7\u6599\uff0c\u5176\u4e2d\u7d55\u5927\u90e8\u5206\u662f\u7f8e\u570b\u548c\u52a0\u62ff\u5927\u7684\u4fe1\u7528\u5361\u3002<\/p>\n<p><em><strong>MajikPOS \u4e8b\u4ef6\u6642\u9593\u8868<\/strong><\/em><\/p>\n<p>\u6839\u64da\u6211\u5011\u7684\u7814\u7a76\u767c\u73fe\uff0c\u4ee5\u4e0b\u662f MajikPOS \u76f8\u95dc\u4e8b\u4ef6\u7684\u5927\u7565\u6642\u9593\u8868\uff1a<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/files\/2017\/03\/majikpos-4.jpg\" width=\"1146\" height=\"611\" \/><\/p>\n<p>\u4e0a\u5716\u5167\u5bb9\u7ffb\u8b6f\u5982\u4e0b\uff1a<\/p>\n<table  class=\" table table-hover\" >\n<tbody>\n<tr>\n<td width=\"327\">2016 \u5e74\u7b2c\u4e09\u3001\u7b2c\u56db\u5b63<\/p>\n<p>\u6b79\u5f92\u5229\u7528\u9023\u63a5\u57e0\u6383\u7784\u7684\u65b9\u5f0f\u6216\u5148\u524d\u5b89\u88dd\u7684\u5f8c\u9580\/\u9060\u7aef\u9059\u63a7\u6728\u99ac\u7a0b\u5f0f\u4f86\u767c\u6398\u6240\u8981\u653b\u64ca\u7684\u76ee\u6a19\u3002<\/td>\n<td width=\"327\">2016 \u5e74 12 \u6708\u81f3 2017 \u5e74 2 \u6708<\/p>\n<p>\u8a3b\u518a\u4fe1\u7528\u5361\u8cc7\u6599\u8ca9\u552e\u5546\u5e97\u7684\u7db2\u57df\u4ee5\u53ca C&amp;C \u7db2\u57df\u3002<\/td>\n<\/tr>\n<tr>\n<td width=\"327\">2017 \u5e74 1 \u6708\u5e95\u81f3 2017 \u5e74 2 \u6708<\/p>\n<p>\u88fd\u4f5c MajikPOS \u6a94\u6848\uff0c\u6211\u5011\u767c\u73fe\u6b79\u5f92\u5f9e\u539f\u59cb\u78bc\u7d44\u8b6f\u5230\u5b8c\u6210\u90e8\u7f72\u53ea\u9700\u5e7e\u500b\u5c0f\u6642\u3002<\/td>\n<td width=\"327\">\u00a02017 \u5e74 1 \u6708\u5e95\u81f3\u4eca<\/p>\n<p>\u90e8\u7f72 MajikPOS \u60e1\u610f\u7a0b\u5f0f\uff0c\u6700\u8fd1\u4e00\u6b21\u8a66\u5716\u611f\u67d3\u7684\u6848\u4f8b\u51fa\u73fe\u5728 2017 \u5e74 3 \u6708 5 \u65e5\uff0c\u5317\u7f8e\u662f\u53d7\u5bb3\u6700\u56b4\u91cd\u7684\u5730\u5340\uff0c\u6fb3\u6d32\u4e5f\u5728\u53d7\u5bb3\u4e4b\u5217\u3002<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><em><strong>\u5176\u4ed6 MajikPOS \u6280\u5de7<\/strong><\/em><\/p>\n<p>MajikPOS \u662f\u4ee5 .NET \u6240\u64b0\u5beb\uff0c\u9019\u4e00\u9ede\u4e0d\u592a\u5e38\u898b\uff0c\u4f46\u4e5f\u975e\u7d55\u7121\u50c5\u6709\u30022015 \u5e74\u6240\u51fa\u73fe\u7684 GamaPOS \u662f<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/new-gamapos-threat-spreads-in-the-us-via-andromeda-botnet\/\">\u7b2c\u4e00\u500b\u5df2\u77e5\u4f7f\u7528 .NET Framework \u64b0\u5beb\u7684 PoS \u60e1\u610f\u7a0b\u5f0f<\/a>\u3002\u5982\u540c\u4eca\u65e5\u5176\u4ed6\u60e1\u610f\u7a0b\u5f0f\u4e00\u6a23\uff0cMajikPOS \u4e5f\u4f7f\u7528\u52a0\u5bc6\u7684\u901a\u8a0a\u4f86\u8b93\u8cc7\u5b89\u8edf\u9ad4\u66f4\u96e3\u5075\u6e2c\u5176\u7db2\u8def\u6d41\u91cf\u3002\u4e26\u4e14\u5982\u540c\u5176\u4ed6\u985e\u4f3c\u5a01\u8105 (\u4f8b\u5982<a href=\"https:\/\/blog.trendmicro.com.tw\/?p=15625\"> Black Atlas \u653b\u64ca\u884c\u52d5<\/a>) \u4e00\u6a23\u5c08\u9580\u9396\u5b9a\u958b\u653e\u7684 RDP \u9023\u63a5\u57e0\u3002<\/p>\n<p>\u9664\u6b64\u4e4b\u5916\uff0c\u6211\u5011\u4e5f\u767c\u73fe\u4e86\u4e00\u4e9b\u6703\u4f7f\u7528\u6a6b\u5411\u79fb\u52d5\u5de5\u5177\u7684 MajikPOS \u6848\u4f8b\u3002\u9019\u8868\u793a\u6b79\u5f92\u4e5f\u6703\u8a66\u5716\u9032\u4e00\u6b65\u523a\u63a2\u53d7\u5bb3\u8005\u7684\u7db2\u8def\u3002\u5728\u5176\u4ed6\u7368\u7acb\u500b\u6848\u7576\u4e2d\uff0c\u6211\u5011\u4e5f\u66fe\u898b\u5230\u6b79\u5f92\u5229\u7528\u67d0\u500b\u6307\u4ee4\u5217\u5de5\u5177\u4f86\u90e8\u7f72 MajikPOS \u548c\u5176\u4ed6 PoS \u60e1\u610f\u7a0b\u5f0f\u3002\u5176\u4ed6\u503c\u5f97\u6ce8\u610f\u7684\u9084\u6709\uff0cMajikPOS \u6703\u5c07\u81ea\u5df1\u7684\u6a94\u6848\u547d\u540d\u6210 Microsoft Windows \u7cfb\u7d71\u7576\u4e2d\u5e38\u898b\u7684\u6a94\u6848\u540d\u7a31\u3002<\/p>\n<p><em><strong>\u5982\u4f55\u964d\u4f4e\u98a8\u96aa<\/strong><\/em><\/p>\n<p>\u53ea\u8981\u6b63\u78ba\u4f7f\u7528<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/moving-forward-with-emv-and-other-payment-technologies\/\">\u6676\u7247\u5f0f (EMV) \u4fe1\u7528\u5361\u518d\u52a0 PIN \u78bc\u4e26\u914d\u5408\u7aef\u5c0d\u7aef\u52a0\u5bc6<\/a>\uff0c\u61c9\u8a72\u5c31\u4e0d\u5fc5\u5bb3\u6015\u9019\u9805\u5a01\u8105\u3002\u4f46\u4e0d\u5e78\u7684\u662f\uff0c\u4e0d\u652f\u63f4\u65b0\u5f0f\u6676\u7247\u5361\u7684 PoS \u7d42\u7aef\u6a5f\u5c31\u6709\u53ef\u80fd\u906d\u5230 MajikPOS\u9019\u985e\u5a01\u8105\u7684\u5371\u5bb3\u3002<\/p>\n<p>\u5118\u7ba1\u7f8e\u570b\u5df2\u7d93\u63a1\u7528 EMV \u6a19\u6e96 (\u9019\u8981\u6b78\u529f\u65bc 2015 \u5e74 10 \u6708\u7684 EMV Liability Shift \u640d\u5931\u8cac\u4efb\u79fb\u8f49\u6cd5\u6848\u7684\u5be6\u65bd)\uff0c\u4f46\u5be6\u969b\u8f49\u63db\u4ecd\u662f\u4e00\u9805\u8271\u96e3\u6311\u6230\u3002\u5f9e 2015 \u5e74 7 \u6708\u81f3 2016 \u5e74 6 \u6708\uff0c\u7f8e\u570b\u7684 EMV \u6676\u7247\u5361\u4ecd<a href=\"https:\/\/www.emvco.com\/about_emvco.aspx?id=202\">\u7b97\u4e0d\u4e0a\u666e\u53ca<\/a>\u3002\u5118\u7ba1\u7f8e\u570b\u4f01\u696d\u548c\u6d88\u8cbb\u8005\u6b63\u9010\u6f38\u6539\u7528\u6676\u7247\u5f0f\u4fe1\u7528\u5361\u8207 PoS \u7d42\u7aef\u6a5f\uff0c\u4f46\u8a31\u591a\u5546\u5bb6\u4ecd\u672a\u4f7f\u7528\u6676\u7247\u7684 PIN \u78bc\u529f\u80fd\u3002\u96d6\u7136 EMV \u6676\u7247\u5361<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/a-year-after-the-emv-liability-shift-are-emv-cards-safe\">\u4e26\u975e\u842c\u9748\u4e39<\/a>\uff0c\u4f46\u662f\u76f8\u8f03\u65bc\u50b3\u7d71\u7684\u78c1\u689d\u5f0f\u4fe1\u7528\u5361\uff0c<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/security-technology\/faq-emv-credit-cards\">EMV \u4ecd\u662f\u8f03\u5b89\u5168\u7684\u9078\u64c7<\/a>\uff0c\u56e0\u70ba\u7d55\u5927\u591a\u6578\u7684 PoS \u60e1\u610f\u7a0b\u5f0f (\u5982 MajikPOS) \u653b\u64ca\u90fd\u662f\u91dd\u5c0d\u78c1\u689d\u5f0f\u4fe1\u7528\u5361\u3002\u4e8b\u5be6\u4e0a\uff0c<a href=\"https:\/\/newsroom.mastercard.com\/press-releases\/u-s-emv-adoption-by-merchants-issuers-continues-industry-collaborates-on-solutions-to-speed-transaction-times\/\">MasterCar<\/a>\u00a0 \u548c <a href=\"https:\/\/usa.visa.com\/dam\/VCOM\/global\/visa-everywhere\/documents\/chip-technology-infographic-jun16.pdf\">Visa<\/a> \u5169\u5927\u6a5f\u69cb\u7686\u8868\u793a\u5728\u6539\u7528 EMV \u6676\u7247\u5361\u4e26\u914d\u5408\u65b0\u7684 PoS \u7cfb\u7d71\u4e4b\u5f8c\uff0c\u4fe1\u7528\u5361\u76dc\u5237\u7684\u60c5\u6cc1\u78ba\u5be6\u5df2\u6e1b\u5c11\u3002<\/p>\n<p>\u4e0d\u50c5\u5982\u6b64\uff0c\u990a\u6210\u4e00\u5957\u826f\u597d\u7684 <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/defending-against-pos-ram-scrapers\/\">PoS \u9632\u7bc4\u7fd2\u6163<\/a>\u4e5f\u6703\u5f88\u6709\u5e6b\u52a9\u3002\u8981\u9032\u4e00\u6b65\u9632\u7bc4 MajikPOS\uff0c\u5efa\u8b70\u60a8\u8981\u59a5\u5584\u4fdd\u8b77\u597d\u9060\u7aef\u5b58\u53d6\u529f\u80fd (\u4f8b\u5982\u7cfb\u7d71\u5167\u5efa\u7684\u9060\u7aef\u684c\u9762\u4ee5\u53ca\u5e02\u9762\u4e0a\u7684 VNC \u8edf\u9ad4)\uff0c\u5c24\u5176\u7576\u60a8\u5141\u8a31\u4f7f\u7528\u8005\u900f\u904e\u7db2\u969b\u7db2\u8def\u9032\u884c\u9060\u7aef\u5b58\u53d6\u6642\u3002\u5c0d\u65bc\u8ca0\u8cac\u4fdd\u8b77\u4f01\u696d\u7aef\u9ede\u88dd\u7f6e\u7684\u8cc7\u5b89\u4eba\u54e1\u548c IT \u7cfb\u7d71\u7ba1\u7406\u54e1\uff0c\u53c3\u95b1\u9069\u7576\u7684\u6587\u4ef6\u4f86\u59a5\u5584\u4fdd\u8b77<a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/cc753488(v=ws.11).aspx)\">\u9060\u7aef\u684c\u9762<\/a>\u548c \u00a0<a href=\"https:\/\/www.realvnc.com\/docs\/security-features.html\">VNC<\/a> \u8edf\u9ad4\u6703\u662f\u500b\u597d\u7684\u958b\u59cb\u3002<\/p>\n<p><em><strong>\u8da8\u52e2\u79d1\u6280\u89e3\u6c7a\u65b9\u6848<\/strong><\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/us\/enterprise\/product-security\/endpoint-application-control\/pos-system-security\/app-whitelisting\/index.html\">\u7aef\u9ede\u88dd\u7f6e\u61c9\u7528\u7a0b\u5f0f\u63a7\u7ba1<\/a>\u6216\u767d\u540d\u55ae\u6a5f\u5236\uff0c\u90fd\u80fd\u76e1\u91cf\u907f\u514d\u88dd\u7f6e\u66b4\u9732\u65bc\u653b\u64ca\u7684\u98a8\u96aa\uff0c\u78ba\u4fdd\u552f\u6709\u767d\u540d\u55ae\u4e0a\u7684\u61c9\u7528\u7a0b\u5f0f\u80fd\u5920\u5b89\u88dd\u66f4\u65b0\u3002\u8da8\u52e2\u79d1\u6280\u7684 <a href=\"https:\/\/www.trendmicro.com\/us\/enterprise\/product-security\/officescan\/\">OfficeScan\u2122<\/a> \u63d0\u4f9b\u4e86\u5404\u9805\u4fdd\u8b77\u7aef\u9ede\u7684\u529f\u80fd\uff0c\u4f8b\u5982\uff0c\u884c\u70ba\u76e3\u63a7\u53ef\u7528\u4f86\u5075\u6e2c\u4e0a\u8ff0\u6848\u4f8b\u4e2d\u51fa\u73fe\u7684\u6a94\u6848\u540d\u7a31 (<em>csrss.exe<\/em> \u548c <em>conhost.exe<\/em>)\uff0c\u4e26\u4e14\u767c\u51fa\u300c\u8207\u7cfb\u7d71\u6a94\u6848\u91cd\u8907\u300d\u7684\u8b66\u8a0a\u3002\u6b64\u5916\uff0c\u9084\u53ef\u4ee5\u5075\u6e2c\u4e26\u9632\u7bc4\u5176\u4ed6\u985e\u4f3c\u7684 RAT \u60e1\u610f\u7a0b\u5f0f\u3002\u8da8\u52e2\u79d1\u6280\u7684 <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/network\/deep-discovery.html\">\u8da8\u52e2\u79d1\u6280\u7684Deep Discovery Inspector<\/a> \u53ef\u7528\u4f86\u767c\u6398\u6b79\u5f92\u8a66\u5716\u5728\u5167\u90e8\u7db2\u8def\u6a6b\u5411\u79fb\u52d5\u7684\u8de1\u8c61\uff0c\u4ee5\u53ca\u53ef\u80fd\u7684\u66b4\u529b\u7834\u89e3\u884c\u70ba\u3002\u8da8\u52e2\u79d1\u6280\u76ee\u524d\u5df2\u7d93\u53ef\u4ee5\u85c9\u7531\u7db2\u7ad9\u4fe1\u8b7d\u8a55\u7b49\u670d\u52d9\u4f86\u6514\u622a MajikPOS \u7684 C&amp;C \u6d41\u91cf\u3002<\/p>\n<p>\u8da8\u52e2\u79d1\u6280\u7684\u9032\u968e\u7aef\u9ede\u9632\u8b77\u89e3\u6c7a\u65b9\u6848\uff0c\u5982\u8da8\u52e2\u79d1\u6280 <a href=\"https:\/\/www.trendmicro.tw\/tw\/business\/complete-software-protection\/index.html\">\u8da8\u52e2\u79d1\u6280 Smart Protection Suites<\/a>\u00a0\u548c <a href=\"https:\/\/www.trendmicro.com\/en_us\/small-business\/worry-free-services.html\">Worry-Free\u2122 <\/a><a href=\"https:\/\/www.trendmicro.com\/en_us\/small-business\/worry-free-services.html\">Business Security<\/a> <a href=\"https:\/\/t.rend.tw\/?i=NDI1OA==\">Worry-Free Pro<\/a>\u80fd\u5075\u6e2c\u4e26\u6514\u622a\u6240\u6709\u76f8\u95dc\u7684\u60e1\u610f\u6a94\u6848\u548c C&amp;C \u901a\u8a0a\u3002\u6b64\u5916\uff0c<a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/capabilities\/solutions-for\/point-of-sale.html\">\u5728 PoS \u88dd\u7f6e\u4e0a\u5be6\u65bd\u61c9\u7528\u7a0b\u5f0f\u63a7\u7ba1<\/a>\u4e5f\u53ef\u5927\u5e45\u964d\u4f4e\u985e\u4f3c\u7684\u5a01\u8105\uff0c\u78ba\u4fdd\u53ea\u6709\u767d\u540d\u55ae\u4e0a\u7684\u61c9\u7528\u7a0b\u5f0f\u624d\u80fd\u5728\u88dd\u7f6e\u4e0a\u57f7\u884c\u3002TippingPoint \u5ba2\u6236\u53ef\u5229\u7528\u4e0b\u5217 ThreatDV \u904e\u6ffe\u689d\u4ef6\u4f86\u9632\u7bc4\u9019\u9805\u5a01\u8105\uff1a<\/p>\n<ul>\n<li>27432: HTTP: TSPY_MAJIKPOS.A Checkin<\/li>\n<\/ul>\n<p>\u5982\u9700\u66f4\u591a\u6709\u95dc MajikPOS \u7684\u5206\u6790\uff0c\u8acb\u53c3\u95b1\u9019\u4efd<a href=\"https:\/\/documents.trendmicro.com\/assets\/majikpos-combines-pos-malware-and-rats-to-pull-off-its-malicious-tricks.pdf\">\u6280\u8853\u7c21\u5831<\/a>\uff0c\u88e1\u9762\u8a73\u8ff0\u4e86\u9019\u9805\u5a01\u8105\u7684\u5165\u4fb5\u6307\u6a19 (IoC)\u3001\u653b\u64ca\u904e\u7a0b\u3001\u60e1\u610f\u884c\u70ba\u4ee5\u53ca\u5931\u7aca\u7684\u8cc7\u6599\u5982\u4f55\u88ab\u6b79\u5f92\u62ff\u5230<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/threat-intelligence-center\/deep-web\/\">\u5730\u4e0b<\/a>\u8ad6\u58c7\u548c\u7db2\u7ad9\u8ca9\u8ce3\u3002<\/p>\n<p>&nbsp;<\/p>\n<p>\u539f\u6587\u51fa\u8655\uff1a<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/majikpos-combines-pos-malware-and-rats\/\">MajikPOS Combines PoS Malware and RATs to Pull Off its Malicious Tricks<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u8da8\u52e2\u79d1\u6280\u767c\u73fe\u4e86\u4e00\u500b\u65b0\u7684\u00a0\u92b7\u552e\u6ac3\u53f0\u7cfb\u7d71 (PoS) \u60e1\u610f\u7a0b\u5f0f\u54c1\u7a2e\uff1aMajikPOS (\u8da8\u52e2\u79d1\u6280\u547d\u540d\u70ba\uff1aTSPY_ [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_wpscppro_dont_share_socialmedia":false,"_wpscppro_custom_social_share_image":0,"_facebook_share_type":"","_twitter_share_type":"","_linkedin_share_type":"","_pinterest_share_type":"","_linkedin_share_type_page":"","_instagram_share_type":"","_medium_share_type":"","_threads_share_type":"","_google_business_share_type":"","_selected_social_profile":[],"_wpsp_enable_custom_social_template":false,"_wpsp_social_scheduling":{"enabled":false,"datetime":null,"platforms":[],"status":"template_only","dateOption":"today","timeOption":"now","customDays":"","customHours":"","customDate":"","customTime":"","schedulingType":"absolute"},"_wpsp_active_default_template":true},"categories":[2679,1335],"tags":[2690,1599,1455,782,1593,2782],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/48923"}],"collection":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=48923"}],"version-history":[{"count":0,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/48923\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=48923"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=48923"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=48923"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}