IntelCrawler update- BlackPOS author forgot delete social network page

Security experts at IntelCrawler provided a new interesting update on BlackPOS author, he forgot to delete his social network page.

Intelligence firm IntelCrawler announced a few days ago that the author of the BlackPOS/Kaptoxa malware used in the attack against Target and Neiman Marcus retailers a teenager known in the underground with the pseudonym of Ree[4].

The first sample of malware was created in March 2013, first documented use of BlackPOS were in Australia, Canada and the US. The first name assigned to the malicious code was “Kaptoxa” (“potato” – in Russian slang), which then was renamed to “DUMP MEMORY GRABBER by Ree[4]” for forum postings, but the title for Command & Control server maintained string “BlackPOS“. Ree[4] is not directly responsible for the attack, he sold the BlackPOS to other cyber gangs from Eastern Europe and other countries, it seems that the owners of underground credit cards shops .rescator“, “Track2.name”, “Privateservices.biz” and many others were his clients.

The malware was already mentioned in the report done by iSIGHT Partners, BlackPOS (aka “Memory Form Grabber”, “Dump Memory Grabber”) is a malicious code easily available due to a leaked version of the source code.
“The original source code was authored by actor “ree[4]” (for more information and attribution, see iSIGHTPartners. “Analysis of “Dump memory Grabber” Point-of-Sale Malware,” Malware Report #13-25113. April 8, 2013; and “Attribution for Russian Actor “Ree[4],” Seller of a Credit card RAM Memory Grabber”, Intel-792666. April 11, 2013″

 

IntelCrawler update also anticipated that several other breaches may be revealed soon, the technique to infect POS systems with memory grabber is consolidated in the cybercrime ecosystem, poorly configured POS and lack of security best practices (e.g. The use of weak passwords)  advantaged the cyber criminals.

Who is Ree[4]?

In the last I preferred to not reveal the name if the young guy, but now it is public, Intercrawler revealed that alleged Russian hacker and malware developer is Sergey Taraspov (ree4), this is the name of the author of BlackPOS.

Sergey Taraspov is based in St.Petersburg and Nizhniy Novgorod (Russian Federation) and he is a very well-known programmer of malicious code in the underground.  I

“He is still visible for us, but the real bad actors responsible for the past attacks on retailers such as Target and Neiman Marcus were just his customers”, comments Dan Clements, IntelCrawler President.

Before both breaches IntelCrawler detected large-scale RDP brute-forcing attacks on Point-of-Sales terminals across the US, Australia and Canada started at the beginning of 2013 year in winter period with weak passwords such as:

 "pos":"pos";
 "micros":"micros" (MICROS Systems, Inc. - Point-of-Sale Hardware);
 "edc":"123456" (EDC - Electronic Draft Capture).

Today I propose you a new exclusive update from security researchers at IntelCrawler on the author of BlackPOS.  The author of BlackPOS is the bad actor with nickname “ree4” or “ree[4]”, he started to sell this malware on one of underground forums called “Exploit.in” under the same nick at the beginning of 2013 as visible in the following screenshot:

 

 

Despite the author of blackPOS malware is a cyber expert, it seems that he has ignored the power of social networking platform, and the possibility to use them for OSINT purposes. One profile of the popular Russian social network VKontakte has the same nickname as BlackPOS author https://vk.com/ree4_ree4. Obviously this is not a body of evidence, but researcher at IntelCrawler noted that one of the interest of the owner of the page is “coding” and it was checked that one of his emails is linked to this page through password recovery option by email.

According to operative information from IntelCrawler, the person behind the nickname “ree[4]” is Rinat Shibaev, working closely with Sergey Taraspov, who was acting as his technical support, having roots in St.Petersburg (Russian Federation), very well-known coder of malicious code in the underground.

Let’s wait for new updates from Andrew Komarov, Dan Clements and the experts at IntelCrawler.

About IntelCrawler

IntelCrawler.com is a multi-tier intelligence aggregator, which gathers information and cyber prints from a starting big data pool of over 3, 000, 000, 000 IPv4 and over 200, 000, 000 domain names, which are scanned for analytics and dissemination to drill down to a desired result. This finite pool of cyber prints is then narrowed further by comparing it to various databases and forum intelligence gathered from the underground and networked security company contacts. The final result could be the location of a particular keyboard or a computer housing the threat.

Pierluigi Paganini

(Security Affairs –  BlackPOS, IntelCrawler)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

CISA adds Cisco ASA and FTD and CrushFTP VFS flaws to its Known Exploited Vulnerabilities catalog

CISA adds Cisco ASA and FTD and CrushFTP VFS vulnerabilities to its Known Exploited Vulnerabilities…

10 hours ago

CISA adds Microsoft Windows Print Spooler flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA added the Windows Print Spooler flaw CVE-2022-38028 to its Known Exploited Vulnerabilities catalog.…

17 hours ago

DOJ arrested the founders of crypto mixer Samourai for facilitating $2 Billion in illegal transactions

The U.S. Department of Justice (DoJ) announced the arrest of two co-founders of a cryptocurrency mixer…

17 hours ago

Google fixed critical Chrome vulnerability CVE-2024-4058

Google addressed a critical Chrome vulnerability, tracked as CVE-2024-4058, that resides in the ANGLE graphics…

22 hours ago

Nation-state actors exploited two zero-days in ASA and FTD firewalls to breach government networks

Nation-state actor UAT4356 has been exploiting two zero-days in ASA and FTD firewalls since November…

1 day ago

Hackers hijacked the eScan Antivirus update mechanism in malware campaign

A malware campaign has been exploiting the updating mechanism of the eScan antivirus to distribute…

2 days ago

This website uses cookies.