Difference between revisions of "TreasureHunt: a custom POS malware tool"
Jump to navigation
Jump to search
Line 1: | Line 1: | ||
{{Publication | {{Publication | ||
|Botnet=TreasureHunt, | |||
|Group=Point-of-sale, | |||
|Year=2016 | |||
|Date=2016-03-28 | |||
|Editor=FireEye | |Editor=FireEye | ||
|Link=https://www.fireeye.com/blog/threat-research/2016/03/treasurehunt_a_cust.html | |Link=https://www.fireeye.com/blog/threat-research/2016/03/treasurehunt_a_cust.html |
Latest revision as of 17:23, 28 March 2016
(Publication) Google search: [1]
TreasureHunt: a custom POS malware tool | |
---|---|
Botnet | TreasureHunt |
Malware | |
Botnet/malware group | Point-of-sale |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2016 / 2016-03-28 |
Editor/Conference | FireEye |
Link | https://www.fireeye.com/blog/threat-research/2016/03/treasurehunt a cust.html (Archive copy) |
Author | Nart Villeneuve |
Type | Blogpost |
Abstract
“ In this article we examine TREASUREHUNT, POS malware that appears to have been custom-built for the operations of a particular “dump shop,” which sells stolen credit card data. TREASUREHUNT enumerates running processes, extracts payment card information from memory, and then transmits this information to a command and control server.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2016BFR4917, editor = {FireEye}, author = {Nart Villeneuve}, title = {TreasureHunt: a custom POS malware tool}, date = {28}, month = Mar, year = {2016}, howpublished = {\url{https://www.fireeye.com/blog/threat-research/2016/03/treasurehunt_a_cust.html}}, }