Fraudsters are using a revamped version of the Alina Trojan to target Windows-based point-of-sale devices to steal payment card data. The malware operators are using unsecured DNS protocols for communication between infected POS devices and their command-and-control server to exfiltrate the data. Stolen payment data is usually sold in underground criminal markets, Black Lotus Labs says. The data can include payment card numbers, expiration dates and a seven-digit number that researchers have not yet decoded.”]
Source: https://www.cuinfosecurity.com/pos-malware-using-dns-to-steal-payment-card-data-a-14551

