{"id":239,"date":"2009-12-15T15:42:03","date_gmt":"2009-12-15T10:12:03","guid":{"rendered":"http:\/\/ivyproschool.com\/blog\/?p=239"},"modified":"2024-11-11T15:40:35","modified_gmt":"2024-11-11T10:10:35","slug":"scammers-scrape-ram-for-bank-for-bank-card-data","status":"publish","type":"post","link":"https:\/\/ivyproschool.com\/blog\/scammers-scrape-ram-for-bank-for-bank-card-data\/","title":{"rendered":"SCAMMERS SCRAPE RAM FOR BANK FOR BANK CARD DATA (IT SECURITY)"},"content":{"rendered":"<p style=\"text-align: justify;\">Forget keyloggers and packet sniffers. In the wake of industry rules requiring credit card data to be encrypted, malware that siphons clear-text information from computer memory is all the rage among scammers, security researchers say.<\/p>\n<p style=\"text-align: justify;\">So-called RAM scrapers scour the random access memory of POS, or point-of-sale, terminals, where PINs and other credit card data must be stored in the clear so it can be processed. When valuable information passes through, it is uploaded to servers controlled by credit card thieves.<\/p>\n<p style=\"text-align: justify;\">While RAM scrapers have been around for a few years, they are a &#8220;fairly new&#8221; threat, according to a report released Wednesday that outlines the 15 most common attacks encountered by security experts at Verizon Business. They come in the wake of Payment Card Industry rules that require credit card data to be encrypted as it passes from merchants to the processing houses.<\/p>\n<p style=\"text-align: justify;\">&#8220;They are definitely a response to some of the external trends that have been going on in the cybercrime environment,&#8221; says Wade Baker, research and intelligence principal for Verizon Business. &#8220;Within a year, we&#8217;ve seen quite a few of them in the wild.&#8221;<\/p>\n<p style=\"text-align: justify;\">Verizon employees recently found the malware on the POS server of an unnamed resort and casino that had an unusually high number of customers who had suffered credit card fraud. The malware was sophisticated enough to log only payment card data rather than dumping the entire contents of memory. That was crucial to ensuring the malware didn&#8217;t create server slowdowns that would tip off administrators.<\/p>\n<p style=\"text-align: justify;\">The RAM scraper dumped the data onto the server&#8217;s hard drive. The perpetrators visited at regular intervals through a backdoor on the machine to collect the booty.<\/p>\n<p style=\"text-align: justify;\">RAM scrapers played a role in four percent of the 592 breaches Verizon Business investigated over a four year period starting in 2004. By contrast, keyloggers and spyware (which comprise a single category) and backdoors factored into 19 percent and 18 percent of the cases respectively.<\/p>\n<p style=\"text-align: justify;\">Jason Milletary, a researcher with SecureWorks&#8217; Counter Threat Unit, said he&#8217;s also seen an uptick in RAM scrapers over the past few years.<\/p>\n<p style=\"text-align: justify;\">&#8220;Typically, these are specialized malware used in more targeted attacks,&#8221; he says. &#8220;Often times, they are customized to to work with specific vendors&#8217; point-of-sale systems, so they understand how the data is formatted and stored.&#8221;<\/p>\n<p style=\"text-align: justify;\">As such, they are rarely detected by anti-virus programs, he and Verizon&#8217;s Baker say. Tell-tale signs they&#8217;ve been installed include the presence of strange rdump files and perl scripts on a hard drive, sudden changes in free disk space and the monitoring of registries and system processes.<\/p>\n<p style=\"text-align: justify;\">The Verizon report is available <a href=\"http:\/\/www.verizonbusiness.com\/go\/09SuppDBIR\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n<p style=\"text-align: justify;\">Source\u00a0: <a href=\"http:\/\/www.securityfocus.com\">www.securityfocus.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Forget keyloggers and packet sniffers. In the wake of industry rules requiring credit card data to be encrypted, malware that siphons clear-text information from computer memory is all the rage among scammers, security researchers say. So-called RAM scrapers scour the random access memory of POS, or point-of-sale, terminals, where PINs and other credit card data must be stored in the clear so it can be processed. When valuable information passes through, it is uploaded to servers controlled by credit card thieves. While RAM scrapers have been around for a few years, they are a &#8220;fairly new&#8221; threat, according to a report released Wednesday that outlines the 15 most common attacks encountered by security experts at Verizon Business. They come in the wake of Payment Card Industry rules that require credit card data to be encrypted as it passes from merchants to the processing houses. &#8220;They are definitely a response to some of the external trends that have been going on in the cybercrime environment,&#8221; says Wade Baker, research and intelligence principal for Verizon Business. &#8220;Within a year, we&#8217;ve seen quite a few of them in the wild.&#8221; Verizon employees recently found the malware on the POS server of an unnamed [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-239","post","type-post","status-publish","format-standard","hentry","category-it-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>RAM Scrapers: The New Threat to Credit Card Security<\/title>\n<meta name=\"description\" content=\"Learn how scammers use RAM scraping malware to steal credit card data from POS systems, bypassing traditional security measures. Stay informed on emerging cyber threats!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ivyproschool.com\/blog\/scammers-scrape-ram-for-bank-for-bank-card-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"RAM Scrapers: The New Threat to Credit Card Security\" \/>\n<meta property=\"og:description\" content=\"Learn how scammers use RAM scraping malware to steal credit card data from POS systems, bypassing traditional security measures. Stay informed on emerging cyber threats!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ivyproschool.com\/blog\/scammers-scrape-ram-for-bank-for-bank-card-data\/\" \/>\n<meta property=\"og:site_name\" content=\"R vs Python: Which Analytics Tool Should You Choose for Data Science?\" \/>\n<meta property=\"article:published_time\" content=\"2009-12-15T10:12:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-11T10:10:35+00:00\" \/>\n<meta name=\"author\" content=\"Spam Prats\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Spam Prats\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/scammers-scrape-ram-for-bank-for-bank-card-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/scammers-scrape-ram-for-bank-for-bank-card-data\\\/\"},\"author\":{\"name\":\"Spam Prats\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#\\\/schema\\\/person\\\/01d3469a45250acdf099bb1467ef3498\"},\"headline\":\"SCAMMERS SCRAPE RAM FOR BANK FOR BANK CARD DATA (IT SECURITY)\",\"datePublished\":\"2009-12-15T10:12:03+00:00\",\"dateModified\":\"2024-11-11T10:10:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/scammers-scrape-ram-for-bank-for-bank-card-data\\\/\"},\"wordCount\":452,\"commentCount\":0,\"articleSection\":[\"IT Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/scammers-scrape-ram-for-bank-for-bank-card-data\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/scammers-scrape-ram-for-bank-for-bank-card-data\\\/\",\"url\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/scammers-scrape-ram-for-bank-for-bank-card-data\\\/\",\"name\":\"RAM Scrapers: The New Threat to Credit Card Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#website\"},\"datePublished\":\"2009-12-15T10:12:03+00:00\",\"dateModified\":\"2024-11-11T10:10:35+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#\\\/schema\\\/person\\\/01d3469a45250acdf099bb1467ef3498\"},\"description\":\"Learn how scammers use RAM scraping malware to steal credit card data from POS systems, bypassing traditional security measures. Stay informed on emerging cyber threats!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/scammers-scrape-ram-for-bank-for-bank-card-data\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/scammers-scrape-ram-for-bank-for-bank-card-data\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/scammers-scrape-ram-for-bank-for-bank-card-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SCAMMERS SCRAPE RAM FOR BANK FOR BANK CARD DATA (IT SECURITY)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/\",\"name\":\"Ivy Professional School | Official Blog\",\"description\":\"Confused between R and Python for your data science journey? Discover the key differences in data visualization, handling capabilities, speed, and ease of learning.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#\\\/schema\\\/person\\\/01d3469a45250acdf099bb1467ef3498\",\"name\":\"Spam Prats\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d0af2e055007729b2006caa5ad5294a2ff77cf96b351e86845763a70a8c0fed2?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d0af2e055007729b2006caa5ad5294a2ff77cf96b351e86845763a70a8c0fed2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d0af2e055007729b2006caa5ad5294a2ff77cf96b351e86845763a70a8c0fed2?s=96&d=mm&r=g\",\"caption\":\"Spam Prats\"},\"url\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/author\\\/admin-2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"RAM Scrapers: The New Threat to Credit Card Security","description":"Learn how scammers use RAM scraping malware to steal credit card data from POS systems, bypassing traditional security measures. Stay informed on emerging cyber threats!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ivyproschool.com\/blog\/scammers-scrape-ram-for-bank-for-bank-card-data\/","og_locale":"en_US","og_type":"article","og_title":"RAM Scrapers: The New Threat to Credit Card Security","og_description":"Learn how scammers use RAM scraping malware to steal credit card data from POS systems, bypassing traditional security measures. Stay informed on emerging cyber threats!","og_url":"https:\/\/ivyproschool.com\/blog\/scammers-scrape-ram-for-bank-for-bank-card-data\/","og_site_name":"R vs Python: Which Analytics Tool Should You Choose for Data Science?","article_published_time":"2009-12-15T10:12:03+00:00","article_modified_time":"2024-11-11T10:10:35+00:00","author":"Spam Prats","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Spam Prats","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ivyproschool.com\/blog\/scammers-scrape-ram-for-bank-for-bank-card-data\/#article","isPartOf":{"@id":"https:\/\/ivyproschool.com\/blog\/scammers-scrape-ram-for-bank-for-bank-card-data\/"},"author":{"name":"Spam Prats","@id":"https:\/\/ivyproschool.com\/blog\/#\/schema\/person\/01d3469a45250acdf099bb1467ef3498"},"headline":"SCAMMERS SCRAPE RAM FOR BANK FOR BANK CARD DATA (IT SECURITY)","datePublished":"2009-12-15T10:12:03+00:00","dateModified":"2024-11-11T10:10:35+00:00","mainEntityOfPage":{"@id":"https:\/\/ivyproschool.com\/blog\/scammers-scrape-ram-for-bank-for-bank-card-data\/"},"wordCount":452,"commentCount":0,"articleSection":["IT Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ivyproschool.com\/blog\/scammers-scrape-ram-for-bank-for-bank-card-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ivyproschool.com\/blog\/scammers-scrape-ram-for-bank-for-bank-card-data\/","url":"https:\/\/ivyproschool.com\/blog\/scammers-scrape-ram-for-bank-for-bank-card-data\/","name":"RAM Scrapers: The New Threat to Credit Card Security","isPartOf":{"@id":"https:\/\/ivyproschool.com\/blog\/#website"},"datePublished":"2009-12-15T10:12:03+00:00","dateModified":"2024-11-11T10:10:35+00:00","author":{"@id":"https:\/\/ivyproschool.com\/blog\/#\/schema\/person\/01d3469a45250acdf099bb1467ef3498"},"description":"Learn how scammers use RAM scraping malware to steal credit card data from POS systems, bypassing traditional security measures. Stay informed on emerging cyber threats!","breadcrumb":{"@id":"https:\/\/ivyproschool.com\/blog\/scammers-scrape-ram-for-bank-for-bank-card-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ivyproschool.com\/blog\/scammers-scrape-ram-for-bank-for-bank-card-data\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ivyproschool.com\/blog\/scammers-scrape-ram-for-bank-for-bank-card-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ivyproschool.com\/blog\/"},{"@type":"ListItem","position":2,"name":"SCAMMERS SCRAPE RAM FOR BANK FOR BANK CARD DATA (IT SECURITY)"}]},{"@type":"WebSite","@id":"https:\/\/ivyproschool.com\/blog\/#website","url":"https:\/\/ivyproschool.com\/blog\/","name":"Ivy Professional School | Official Blog","description":"Confused between R and Python for your data science journey? Discover the key differences in data visualization, handling capabilities, speed, and ease of learning.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ivyproschool.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/ivyproschool.com\/blog\/#\/schema\/person\/01d3469a45250acdf099bb1467ef3498","name":"Spam Prats","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d0af2e055007729b2006caa5ad5294a2ff77cf96b351e86845763a70a8c0fed2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d0af2e055007729b2006caa5ad5294a2ff77cf96b351e86845763a70a8c0fed2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d0af2e055007729b2006caa5ad5294a2ff77cf96b351e86845763a70a8c0fed2?s=96&d=mm&r=g","caption":"Spam Prats"},"url":"https:\/\/ivyproschool.com\/blog\/author\/admin-2\/"}]}},"_links":{"self":[{"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/posts\/239","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/comments?post=239"}],"version-history":[{"count":1,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/posts\/239\/revisions"}],"predecessor-version":[{"id":12534,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/posts\/239\/revisions\/12534"}],"wp:attachment":[{"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/media?parent=239"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/categories?post=239"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/tags?post=239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}