{"id":42164,"date":"2015-03-24T16:31:50","date_gmt":"2015-03-24T23:31:50","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=42164"},"modified":"2025-06-03T22:04:08","modified_gmt":"2025-06-04T05:04:08","slug":"pos-malware-uses-time-stamp-check-to-evade-detection","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pos-malware-uses-time-stamp-check-to-evade-detection\/","title":{"rendered":"POS Malware Uses Time-Stamp Check to Evade Detection"},"content":{"rendered":"<p><em>This blog post was written by Kumaraguru Velmurugan.<\/em><\/p>\n<p>Point of sale (POS) attacks appear to have gained in popularity during the past year or so. We have seen major retail chains targeted by different strains of POS <a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus\/malware.html\">malware<\/a>. Equipped with memory-scraping functionality, POS malware steals credit or debit card information from shoppers who use their cards for payments.<\/p>\n<p>The following illustration shows the similarity of a recent variant we have captured against previous samples we\u2019ve seen. The code has undergone minimal changes since its inception.<\/p>\n<p><a href=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/blog_img9.jpg.png.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-42179 aligncenter\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/blog_img9.jpg.png.jpg\" alt=\"blog_img9.jpg.png\" width=\"556\" height=\"276\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/blog_img9.jpg.png.jpg 1370w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/blog_img9.jpg.png-300x149.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/blog_img9.jpg.png-1024x508.jpg 1024w\" sizes=\"auto, (max-width: 556px) 100vw, 556px\" \/><\/a><\/p>\n<p>Black POS malware is one of the most prevalent POS families in the wild. Recently we noticed new variants of Black POS that exhibit no behavior when executed in a synthetic environment. This inactivity in a sandbox promptly captured our attention. This new variant of Black POS checks the system time on the infected machine against the hardcoded time stamp on the executable. (Malware has long used this technique to be active only during certain periods, while remaining dormant the rest of the time.)<\/p>\n<p>This variant of Black POS was compiled with Borland C++. Next we see one sample\u2019s main function, in which time is checked against a preset value.<\/p>\n<p><a href=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/blog_img1.jpg.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-42166 aligncenter\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/blog_img1.jpg.png\" alt=\"timestamp_check.jpg\" width=\"657\" height=\"212\" \/><\/a><\/p>\n<p>Looking at the malware&#8217;s time stamp, Wed 14 Jan 2015 18:14:29 GMT, we see the malware is designed to exhibit its behavior for one month from the time it was compiled.<\/p>\n<p>The key functions of this sample include memory dumping and enumerating modules loaded in process memory.<\/p>\n<p><a href=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/blog_img2.jpg.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-42171 aligncenter\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/blog_img2.jpg.png\" alt=\"blog_img2.jpg\" width=\"608\" height=\"434\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/blog_img2.jpg.png 843w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/blog_img2.jpg-300x214.png 300w\" sizes=\"auto, (max-width: 608px) 100vw, 608px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/blog_img3.jpg.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-42173 aligncenter\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/blog_img3.jpg.png\" alt=\"blog_img3.jpg\" width=\"599\" height=\"381\" \/><\/a><\/p>\n<p>The sample also scans for credit card information in memory by employing a <a href=\"https:\/\/www.pcre.org\/\">Perl Compatible Regular Expressions<\/a> engine, as shown in the following image.<\/p>\n<p><a href=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/blog_img6.jpg.png.jpg.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-42174 aligncenter\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/blog_img4.jpg.png\" alt=\"blog_img4.jpg\" width=\"691\" height=\"171\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/blog_img4.jpg.png 914w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/blog_img4.jpg-300x74.png 300w\" sizes=\"auto, (max-width: 691px) 100vw, 691px\" \/><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-42175 aligncenter\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/blog_img5.jpg.png.jpg\" alt=\"blog_img5.jpg.png\" width=\"691\" height=\"173\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/blog_img5.jpg.png.jpg 875w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/blog_img5.jpg.png-300x75.jpg 300w\" sizes=\"auto, (max-width: 691px) 100vw, 691px\" \/><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-42176 aligncenter\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/blog_img6.jpg.png.jpg.png\" alt=\"blog_img6.jpg.png.jpg\" width=\"695\" height=\"128\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/blog_img6.jpg.png.jpg.png 894w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/blog_img6.jpg.png.jpg-300x55.png 300w\" sizes=\"auto, (max-width: 695px) 100vw, 695px\" \/><\/a><\/p>\n<h2>McAfee Advanced Threat Defense<\/h2>\n<p><a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/advanced-threat-defense.html\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee Advanced Threat Defense<\/a> detects the samples involved in this attack. The sample is detected via static code analysis, the Family Classification module.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This blog post was written by Kumaraguru Velmurugan. Point of sale (POS) attacks appear to have gained in popularity during&#8230;<\/p>\n","protected":false},"author":695,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[180],"coauthors":[4136],"class_list":["post-42164","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>POS Malware Uses Time-Stamp Check to Evade Detection | McAfee Blog<\/title>\n<meta name=\"description\" content=\"PoS malware uses timestamp check to make its campaign shot life and evade sandbox by exiting initially to stop running it&#039;s malicious code\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"POS Malware Uses Time-Stamp Check to Evade Detection | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"PoS malware uses timestamp check to make its campaign shot life and evade sandbox by exiting initially to stop running it&#039;s malicious code\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pos-malware-uses-time-stamp-check-to-evade-detection\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-03-24T23:31:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-04T05:04:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/blog_img9.jpg.png.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1370\" \/>\n\t<meta property=\"og:image:height\" content=\"680\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pos-malware-uses-time-stamp-check-to-evade-detection\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pos-malware-uses-time-stamp-check-to-evade-detection\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"POS Malware Uses Time-Stamp Check to Evade Detection\",\"datePublished\":\"2015-03-24T23:31:50+00:00\",\"dateModified\":\"2025-06-04T05:04:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pos-malware-uses-time-stamp-check-to-evade-detection\/\"},\"wordCount\":301,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pos-malware-uses-time-stamp-check-to-evade-detection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/blog_img9.jpg.png.jpg\",\"keywords\":[\"malware\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pos-malware-uses-time-stamp-check-to-evade-detection\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pos-malware-uses-time-stamp-check-to-evade-detection\/\",\"name\":\"POS Malware Uses Time-Stamp Check to Evade Detection | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pos-malware-uses-time-stamp-check-to-evade-detection\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pos-malware-uses-time-stamp-check-to-evade-detection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/blog_img9.jpg.png.jpg\",\"datePublished\":\"2015-03-24T23:31:50+00:00\",\"dateModified\":\"2025-06-04T05:04:08+00:00\",\"description\":\"PoS malware uses timestamp check to make its campaign shot life and evade sandbox by exiting initially to stop running it's malicious code\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pos-malware-uses-time-stamp-check-to-evade-detection\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pos-malware-uses-time-stamp-check-to-evade-detection\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pos-malware-uses-time-stamp-check-to-evade-detection\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/blog_img9.jpg.png.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/blog_img9.jpg.png.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pos-malware-uses-time-stamp-check-to-evade-detection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"POS Malware Uses Time-Stamp Check to Evade Detection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"POS Malware Uses Time-Stamp Check to Evade Detection | McAfee Blog","description":"PoS malware uses timestamp check to make its campaign shot life and evade sandbox by exiting initially to stop running it's malicious code","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"POS Malware Uses Time-Stamp Check to Evade Detection | McAfee Blog","og_description":"PoS malware uses timestamp check to make its campaign shot life and evade sandbox by exiting initially to stop running it's malicious code","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pos-malware-uses-time-stamp-check-to-evade-detection\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2015-03-24T23:31:50+00:00","article_modified_time":"2025-06-04T05:04:08+00:00","og_image":[{"width":1370,"height":680,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/blog_img9.jpg.png.jpg","type":"image\/jpeg"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pos-malware-uses-time-stamp-check-to-evade-detection\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pos-malware-uses-time-stamp-check-to-evade-detection\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"POS Malware Uses Time-Stamp Check to Evade Detection","datePublished":"2015-03-24T23:31:50+00:00","dateModified":"2025-06-04T05:04:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pos-malware-uses-time-stamp-check-to-evade-detection\/"},"wordCount":301,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pos-malware-uses-time-stamp-check-to-evade-detection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/blog_img9.jpg.png.jpg","keywords":["malware"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pos-malware-uses-time-stamp-check-to-evade-detection\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pos-malware-uses-time-stamp-check-to-evade-detection\/","name":"POS Malware Uses Time-Stamp Check to Evade Detection | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pos-malware-uses-time-stamp-check-to-evade-detection\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pos-malware-uses-time-stamp-check-to-evade-detection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/blog_img9.jpg.png.jpg","datePublished":"2015-03-24T23:31:50+00:00","dateModified":"2025-06-04T05:04:08+00:00","description":"PoS malware uses timestamp check to make its campaign shot life and evade sandbox by exiting initially to stop running it's malicious code","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pos-malware-uses-time-stamp-check-to-evade-detection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pos-malware-uses-time-stamp-check-to-evade-detection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pos-malware-uses-time-stamp-check-to-evade-detection\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/blog_img9.jpg.png.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/blog_img9.jpg.png.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pos-malware-uses-time-stamp-check-to-evade-detection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"POS Malware Uses Time-Stamp Check to Evade Detection"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/42164","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=42164"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/42164\/revisions"}],"predecessor-version":[{"id":215050,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/42164\/revisions\/215050"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=42164"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=42164"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=42164"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=42164"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}