Difference between revisions of "FighterPOS: a new one-man PoS malware campaign"
Jump to navigation
Jump to search
(Created page with "{{Publication|Date=2015-04-10}}") |
|||
Line 1: | Line 1: | ||
{{Publication|Date=2015-04-10}} | {{Publication | ||
|Botnet=FighterPOS, | |||
|Group=Point-of-sale, | |||
|Year=2015 | |||
|Date=2015-04-10 | |||
|Editor=Trend Micro | |||
|Link=http://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/fighterpos-one-man-pos-malware-campaign | |||
|Type=Tech report | |||
|Abstract=This research paper offers a look into a one-man PoS malware campaign run by a prolific cybercriminal, “AlejandroV”. According to collected data, his PoS malware, dubbed “FighterPOS,” has hit 200 organizations across Brazil, Mexico, Italy, and the UK since early 2014 and has managed to scrape 22,000 credit card numbers within a month. AlejandroV does not only run his own campaign, but also sells FighterPOS to other cybercriminals in the underground forums. This “career change” seems surprising since our investigation has revealed that AlejandroV has a long history of carding and payment scams, taking both the role of malware developer and seller. | |||
}} |
Revision as of 03:31, 22 August 2015
(Publication) Google search: [1]
FighterPOS: a new one-man PoS malware campaign | |
---|---|
Botnet | FighterPOS |
Malware | |
Botnet/malware group | Point-of-sale |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2015 / 2015-04-10 |
Editor/Conference | Trend Micro |
Link | http://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/fighterpos-one-man-pos-malware-campaign (Archive copy) |
Author | |
Type | Tech report |
Abstract
“ This research paper offers a look into a one-man PoS malware campaign run by a prolific cybercriminal, “AlejandroV”. According to collected data, his PoS malware, dubbed “FighterPOS,” has hit 200 organizations across Brazil, Mexico, Italy, and the UK since early 2014 and has managed to scrape 22,000 credit card numbers within a month. AlejandroV does not only run his own campaign, but also sells FighterPOS to other cybercriminals in the underground forums. This “career change” seems surprising since our investigation has revealed that AlejandroV has a long history of carding and payment scams, taking both the role of malware developer and seller.
Bibtex
@misc{empty2015BFR4754,
editor = {Trend Micro},
author = {},
title = {FighterPOS: a new one-man PoS malware campaign},
date = {10},
month = Apr,
year = {2015},
howpublished = {\url{http://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/fighterpos-one-man-pos-malware-campaign}},
}