One-man PoS malware operation captures 22,000 credit card details in Brazil
(Publication) Google search: [1]
One-man PoS malware operation captures 22,000 credit card details in Brazil | |
---|---|
Botnet | FighterPOS |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2015 / 2015-04-13 |
Editor/Conference | TrendLabs Security Intelligence Blog |
Link | http://blog.trendmicro.com/trendlabs-security-intelligence/fighterpos-fighting-a-new-pos-malware-family/ (Archive copy) |
Author | |
Type | Blogpost |
Abstract
“ We have been able to identify a new point-of-sale (PoS) malware family that has affected more than 100 victim organizations in Brazil. We have dubbed this new malware family as “FighterPOS”. This name is derived from BRFighter, the tool used by the author to create this new threat. This one-man operation has been able to steal more than 22,000 unique credit card numbers.
Its creator appears to have had a long history in carding, payment scams, and malware creation; in addition we believe that this malware author acted independently and without any accomplices or associates. FighterPOS is not cheap. It is currently priced at 18 bitcoins (currently worth around US$5,250). However, its control panel is well-designed and it supports a wide variety of features that may be useful to attackers.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2015BFR1584, editor = {TrendLabs Security Intelligence Blog}, author = {}, title = {One-man PoS malware operation captures 22,000 credit card details in Brazil}, date = {13}, month = Apr, year = {2015}, howpublished = {\url{http://blog.trendmicro.com/trendlabs-security-intelligence/fighterpos-fighting-a-new-pos-malware-family/}}, }