Names | GetMyPass getmypos | |
Category | Malware | |
Type | POS malware, Credential stealer | |
Description | (securitykitten) To run this malware successfully the attacker would need several pieces of information: • Credentials • Name of the POS executable / service • A method for moving the data out of the network This malware seems to be in its infancy. There are debug strings still existent in the malware indicate to me that the author is still testing the tool or is still actively developing it. | |
Information | <https://securitykitten.github.io/2014/11/26/getmypass-point-of-sale-malware.html> <https://securitykitten.github.io/2015/01/08/getmypass-point-of-sale-malware-update.html> <https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/the-evolution-of-point-of-sale-pos-malware> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.getmypass> |
Last change to this tool card: 28 December 2022
Download this tool card in JSON format
Previous: GetMail
Next: GetUserSPNS.vbs
Changed | Name | Country | Observed | ||
Unknown groups | |||||
_[ Interesting malware not linked to an actor yet ]_ |
1 group listed (0 APT, 0 other, 1 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |