{"id":21130,"date":"2023-02-01T08:30:31","date_gmt":"2023-02-01T16:30:31","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/02\/01\/news-14863\/"},"modified":"2023-02-01T08:30:31","modified_gmt":"2023-02-01T16:30:31","slug":"news-14863","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/02\/01\/news-14863\/","title":{"rendered":"Why contactless payments may not work | Kaspersky official blog"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/02\/01104439\/Prilex-blocks-nfc-Featured.jpg\"\/><\/p>\n<p><strong>Credit to Author: Hugh Aver| Date: Wed, 01 Feb 2023 15:51:47 +0000<\/strong><\/p>\n<p>A customer holds their handheld device to the POS terminal \u2014 but the contactless payment doesn&#8217;t work. Why? Maybe the device itself is damaged, or maybe the NFC reader chip is failing, but it could be something else: the POS terminal might be infected with Prilex malware, which hunts for bank cards; and it&#8217;s now able to block contactless transactions.<\/p>\n<h2>What is Prilex and why does it block NFC transactions?<\/h2>\n<p>Prilex is a cybercriminal group that&#8217;s been hunting down bank card data since 2014. Recently it&#8217;s been focusing on attacks through POS terminals. At the end of last year, our Kaspersky Global Research and Analysis Team (GReAT) experts conducted a <a href=\"https:\/\/securelist.com\/prilex-atm-pos-malware-evolution\/107551\/\" target=\"_blank\" rel=\"noopener\">detailed study<\/a> on the evolution of this malware, and concluded that Prilex is one of the first groups that learned how to clone credit card transactions, even those protected by chip-and-PIN technology.<\/p>\n<p>But Prilex continues to evolve: while investigating an incident, our experts <a href=\"https:\/\/securelist.com\/prilex-modification-now-targeting-contactless-credit-card-transactions\/108569\/\" target=\"_blank\" rel=\"noopener\">discovered<\/a> new samples of this malware. One of its novelties is its ability to block transactions via NFC. NFC-based transactions can generate a unique identifier that&#8217;s valid for just one transaction \u2014 something that&#8217;s not too appealing to a scammer. So, by preventing the contactless payment, attackers are trying to convince the customer to put the card into the device.<\/p>\n<h2>How does Prilex infect POS terminals and who does it hunt for?<\/h2>\n<p>According to our expert&#8217;s <a href=\"https:\/\/securelist.com\/it-threat-evolution-q3-2022\/107957\/\" target=\"_blank\" rel=\"noopener\">report<\/a>, the attackers use social engineering methods to infect a terminal. Usually they try to convince the employees of the retail outlet that they urgently need to update the terminal&#8217;s software. To do this, they ready to send their &#8220;technical specialist&#8221; directly to the store, or at least ask to provide them with remote access by installing the AnyDesk program.<\/p>\n<p>The Prilex group is interested in organizations engaged in retail trade; i.e., using POS terminals. Of particular interest to them are devices that operate in busy shopping malls in large cities: thousands of cards can pass through them daily.<\/p>\n<p>Prilex&#8217;s activity is mostly observed in the LatAm region. However, modern cybercriminals often borrow each other&#8217;s tools, so it&#8217;s possible that the same malware will be used in other regions. In fact there&#8217;s <a href=\"https:\/\/www.zdnet.com\/article\/german-bank-loses-eur1-5-million-in-mysterious-cashout-of-emv-cards\/\" target=\"_blank\" rel=\"nofollow noopener\">evidence<\/a> that the same malware (or at least technology) has already been used in Germany.<\/p>\n<h2>How to stay safe?<\/h2>\n<p>If you work in retail and notice that your terminal has begun to reject contactless payments, this is a good reason to contact your IT staff, at a minimum (if the problem is the hardware, they&#8217;ll fix it; if there&#8217;s an infection, they&#8217;ll bring in information security or third-party experts for help).<\/p>\n<p>For retail companies (especially large networks with many branches), it&#8217;s important to develop internal regulations and explain to all employees exactly how technical support and\/or maintenance crews should operate. This should at least prevent unauthorized access to POS-terminals. In addition, increasing <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/security-awareness?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____\" target=\"_blank\"> employee&#8217;s awareness of the latest cyberthreats<\/a> is always a good idea: that way they&#8217;ll be much less susceptible to new social engineering tricks.<\/p>\n<p>As for POS-terminal manufacturers, they&#8217;d be well-advised to embed integrated security solutions <a href=\"https:\/\/www.kaspersky.com\/partners\/technology\/solutions?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____\" target=\"_blank\">inside their devices<\/a>.<\/p>\n<p> <input type=\"hidden\" class=\"category_for_banner\" value=\"kasap\" \/> <br \/><a href=\"https:\/\/www.kaspersky.com\/blog\/prilex-blocks-nfc\/47044\/\" target=\"bwo\" >https:\/\/blog.kaspersky.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/02\/01104439\/Prilex-blocks-nfc-Featured.jpg\"\/><\/p>\n<p><strong>Credit to Author: Hugh Aver| Date: Wed, 01 Feb 2023 15:51:47 +0000<\/strong><\/p>\n<p>Prilex malware has learned how to block NFC based transactions to prevent contactless payments.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10425,10378],"tags":[17751,1001,12177,3764,16856,12321,10510],"class_list":["post-21130","post","type-post","status-publish","format-standard","hentry","category-kaspersky","category-security","tag-bank-cards","tag-business","tag-enterprise","tag-malware","tag-pos","tag-smb","tag-social-engineering"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21130","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=21130"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21130\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=21130"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=21130"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=21130"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}