Skip to the main content.
Contact
Contact

1 min read

CDRThief New VoIP Linux Malware – Can Credit Card Skimmers be Far Behind?

CDRThief New VoIP Linux Malware – Can Credit Card Skimmers be Far Behind?

Many organizations have either undergone or are planning migrations or acceleration of call centers, remote working, and online presence exploiting technologies like VoIP. Criminals are increasingly taking an interest in these channels. An interesting discovery by ESET, Linux based malware targeting soft-switches produced by China based Linknat. Two models are affected the VOS2009 and VOS3000.

This malware steals call detail recording (CDR) metadata from the systems internal MySQL database. At this time it’s believed that the goal of this malware is International Revenue Share Fraud (IRSF).

While this isn’t a VoIP Credit Card Skimmer, it demonstrates that there are skilled bad actors actively exploiting telephony technologies. This development shows why it is important to review all information channels and ensure that they are both secure and compliant.

Learn More

Don’t Tie Yourself in Knots Thinking you can Store Payment Card Verification Codes/Values

Don’t Tie Yourself in Knots Thinking you can Store Payment Card Verification Codes/Values

Card Not Present Security Codes/Values are the 3 and 4 digit printed numbers on your payment cards used to verify card-not-present transactions. PCI...

Read More
PCI DSS May Require Pulling Up Your SOX (or ISO)

PCI DSS May Require Pulling Up Your SOX (or ISO)

Executives and managers in organizations preparing for their first onsite PCI security assessment may feel confident that having passed a SOX audit...

Read More
What Is Sensitive Authentication Data in PCI Compliance?

What Is Sensitive Authentication Data in PCI Compliance?

Sensitive authentication data, aka SAD, in PCI compliance is data used by the issuers of cards to authorize transactions. Similar to cardholder...

Read More