Difference between revisions of "FighterPOS: a new one-man PoS malware campaign"

From Botnets.fr
Jump to navigation Jump to search
 
Line 6: Line 6:
|Editor=Trend Micro
|Editor=Trend Micro
|Link=http://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/fighterpos-one-man-pos-malware-campaign
|Link=http://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/fighterpos-one-man-pos-malware-campaign
|Author=Trend Micro Forward-Looking Threat Research Team,
|Type=Tech report
|Type=Tech report
|Abstract=This research paper offers a look into a one-man PoS malware campaign run by a prolific cybercriminal, “AlejandroV”. According to collected data, his PoS malware, dubbed “FighterPOS,” has hit 200 organizations across Brazil, Mexico, Italy, and the UK since early 2014 and has managed to scrape 22,000 credit card numbers within a month. AlejandroV does not only run his own campaign, but also sells FighterPOS to other cybercriminals in the underground forums. This “career change” seems surprising since our investigation has revealed that AlejandroV has a long history of carding and payment scams, taking both the role of malware developer and seller.
|Abstract=This research paper offers a look into a one-man PoS malware campaign run by a prolific cybercriminal, “AlejandroV”. According to collected data, his PoS malware, dubbed “FighterPOS,” has hit 200 organizations across Brazil, Mexico, Italy, and the UK since early 2014 and has managed to scrape 22,000 credit card numbers within a month. AlejandroV does not only run his own campaign, but also sells FighterPOS to other cybercriminals in the underground forums. This “career change” seems surprising since our investigation has revealed that AlejandroV has a long history of carding and payment scams, taking both the role of malware developer and seller.
}}
}}

Latest revision as of 05:32, 22 August 2015

(Publication) Google search: [1]

FighterPOS: a new one-man PoS malware campaign
Botnet FighterPOS
Malware
Botnet/malware group Point-of-sale
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2015 / 2015-04-10
Editor/Conference Trend Micro
Link http://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/fighterpos-one-man-pos-malware-campaign (Archive copy)
Author Trend Micro Forward-Looking Threat Research Team
Type Tech report

Abstract

This research paper offers a look into a one-man PoS malware campaign run by a prolific cybercriminal, “AlejandroV”. According to collected data, his PoS malware, dubbed “FighterPOS,” has hit 200 organizations across Brazil, Mexico, Italy, and the UK since early 2014 and has managed to scrape 22,000 credit card numbers within a month. AlejandroV does not only run his own campaign, but also sells FighterPOS to other cybercriminals in the underground forums. This “career change” seems surprising since our investigation has revealed that AlejandroV has a long history of carding and payment scams, taking both the role of malware developer and seller.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2015BFR4754,
   editor = {Trend Micro},
   author = {Trend Micro Forward-Looking Threat Research Team},
   title = {FighterPOS: a new one-man PoS malware campaign},
   date = {10},
   month = Apr,
   year = {2015},
   howpublished = {\url{http://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/fighterpos-one-man-pos-malware-campaign}},
 }