Malware funnels smartcard PINs to remote servers

http://blogs.vmware.com/tp/teamfusion/WindowsLiveWriter/smart%20card.jpg

A researcher has developed malware capable of remotely stealing two factor PINs generated by USB smartcards.

The malware was unique in that it used a driver to access the USB port and ship PINs stolen using a keylogger to a remote command and control server.

Author and penetration tester Paul Rascagneres (RootBSD) said the malware would work on most USB smartcards.  “I did not test the proof of concept on all providers, but as the malware shares the USB device in raw, we do not target any specific smartcard,” Rascagneres said.

Read more: Malware funnels smartcard PINs to remote servers

Story added 15. November 2012, content source with full text you can find at link above.