A new kind of point-of-sale malware similar to that which struck Target is being sold in underground markets for $2,000.The malware, LusyPOS, was found on VirusTotal, a website where people can submit malware samples to see if one of several dozen security applications detects it.It had also been advertised on an underground carding website, where people buy and sell stolen payment card data, said Brian Minick, vice president of the advanced security business of CBTS, a Cincinnati, Ohio-based security company.“It’s the first we’ve seen of it,” Minick said. “It looks pretty new.” Retailers across the U.S. have been hit hard by malware that scans the volatile memory of computers connected to point-of-sale systems, which handle card payments. Home Depot said it lost 56 million card details to this type of attack over a six-month period earlier this year, one of the largest data breaches on record.Nick Hoffman, a reverse engineer with CBTS, wrote in a blog post that LusyPOS shares some of the same characteristics as two other well-known POS malware programs, Dexter and Chewbacca. In a January report, the security company RSA said Chewbacca was a simple of piece of malware but one that had infected the systems of at least 35 retailers.Minick said it’s not uncommon for malware writers to borrow code from other programs to make a new malicious application for profit.“I think is showing reuse of code that was out there,” Minick said in a phone interview Monday. “So these developers are now taking the best of what has been publicly published and reusing that to create a new tool…to try to make a quick buck”LusyPOS appears to share some of the same source code as Dexter and other characteristics of Chewbacca, Minick said.For example, LusyPOS uses Tor for communication, which encrypts content. Tor, short for The Onion Router, is a software package that is designed to make people’s Web traffic more anonymous by encrypting and routing it through a network of worldwide servers.Hoffman found LusyPOS on VirusTotal, which lets people submit malware samples to see if they are detected by more than four dozen antivirus programs. The sample was submitted to VirusTotal on Nov. 30, Minick said. As of recently, LusyPOS was only detected by seven applications, Minick said. Two of those applications flagged LusyPOS for its use of a Tor package.Tor is a legitimate tool for protecting one’s privacy on the Web, but it can easily be incorporated into tools that are malicious. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe