Three month FrameworkPOS malware campaign nabs ~43,000 credit cards from point of sale systems

From Botnets.fr
Jump to navigation Jump to search

(Publication) Google search: [1]

Three month FrameworkPOS malware campaign nabs ~43,000 credit cards from point of sale systems
Botnet FrameworkPOS
Malware
Botnet/malware group
Exploit kits
Services
Feature Memory scrapping
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2016 / 2016-02-18
Editor/Conference Anomali
Link https://blog.anomali.com/three-month-frameworkpos-malware-campaign-nabs-43000-credits-cards-from-poi (Archive copy)
Author Luis Mendieta
Type Blogpost

Abstract

Threatstream Labs came across an interesting FrameworkPOS sample that given it is two months old, its digitally signed and its certificate hasn't been revoked. FrameworkPOS is a malware family that targets POS (Point of Sale) terminals and its main objective is to steal credit card data from them in order to be sold in the black market. This blogpost is divided in two sections. The first section aims to analyze the malware's capabilities e.g.: c2 connectivity, encoding mechanisms and overall system activity. The second section will provide an analysis on campaign information that was gathered throughout the research.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2016BFR4920,
   editor = {Anomali},
   author = {Luis Mendieta},
   title = {Three month FrameworkPOS malware campaign nabs ~43,000 credit cards from point of sale systems},
   date = {18},
   month = Feb,
   year = {2016},
   howpublished = {\url{https://blog.anomali.com/three-month-frameworkpos-malware-campaign-nabs-43000-credits-cards-from-poi}},
 }