• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Guide
  • Home Improvement
  • Gadget & Apps
  • Deals
  • News

Pirated version of Card Recon sold to cybercriminals

By Guest Authors

When retail company Target was targeted by cybercriminals in December of last year through point of sale service attacks, there was growing anxiety over the security layer being put on customer data of other retail stores.

But a recent revelation of how a software tool used to search for payment card data stored in POS has been leaked to the hacking community might just aggravate the worries of netizens.

Pirated copies of the Card Recon has been stolen by cyber criminals. Ground Labs developed the software tool to help auditors conduct review of networks for information about sales payments from customers and consumers. That will help companies fulfill the requirements mandated by the Payment Card Industry’s Data Security Standard for protecting payment card data.

card-recon-hack

Stolen versions of Card Recon have been incorporated as an essential component of malware programs designed to target POS terminals such as cash registers and ATMs, showing the dichotomy of its purpose, namely for auditing and for cyber crime if used by attackers.

For its intended use, the Card Recon is designed to locate card details in the almost untapped corners of an organization’s network and consolidate the resulting information into a report for enterprises to secure the data.

It is also built to strictly enforce a genuine copy of the software to be the only version that will be permitted to function. So a pirated copy is out of question whether it could be possibly used also. However, that strict requirement ends when a genuine user starts getting his or her hands on the tool, which means restrictions to that copy that he or she has purchased with a license fee are lifted and attackers can have the chance to manipulate the software for their own malicious purposes.

Well, that is already the norm in today’s technology landscape, that when someone purchases a legit copy of a certain software product, hackers are quick to gain access to that copy using illegal methods and tweak the product in order to disable the license restrictions of the software.

How does Card Recon work in POS terminals? It scans 16-digit numbers and isolate those figures from the credit card numbers. There is a malware called Huq, which experts spotted in the wild that cyber criminals are using to detect cards according to their labels – Discover, Visa and MasterCard.

The only best possible option to stop the Card Recon manipulation is to delete personally identifiable and sensitive information from POS terminals.

Disclosure: We might earn commission from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Footer

Pexar Starlight 15.6″ Digital Photo Frame Review – Turning Family Photos Into Gallery-Worthy Displays

TourBox Elite Plus Review: A Better Way to Edit in Lightroom Classic

Ugee Trio Pad UT3 Review – A Giant Matte Tablet That Feels Almost Like E-Ink

MEEPO Flow Electric Skateboard Review – A Beginner’s Experience

Follow TechWalls

YoutubeFacebookXInstagram

Recent Posts

  • Power Through the Holidays: Why the ABOK Ark3600 Is the Ultimate Winter Gift
  • The Sound-Driven Relaxation Revolution: Introducing the Vibroacoustic Therapy Chair
  • Pexar Starlight 15.6″ Digital Photo Frame Review – Turning Family Photos Into Gallery-Worthy Displays
  • Curate the Perfect Workspace: The 2025 Christmas Guide to NuPhy Keyboards for Every Need

Copyright © 2025 · All Rights Reserved