Names | SUCEFUL | |
Category | Malware | |
Type | ATM malware | |
Description | (FireEye) FireEye Labs discovered a new piece of ATM malware (4BDD67FF852C221112337FECD0681EAC) that we detect as Backdoor.ATM.Suceful (the name comes from a typo made by the malware authors), which targets cardholders and is able to retain debit cards on infected ATMs, disable alarms, or read the debit card tracks. | |
Information | <https://www.fireeye.com/blog/threat-research/2015/09/suceful_next_genera.html> <https://documents.trendmicro.com/assets/white_papers/wp-cashing-in-on-atm-malware.pdf> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.suceful> | |
AlienVault OTX | <https://otx.alienvault.com/browse/pulses?q=tag:suceful> |
Last change to this tool card: 24 April 2021
Download this tool card in JSON format
Previous: SubtractThis
Next: SUDDENICON
Changed | Name | Country | Observed | ||
Unknown groups | |||||
_[ Interesting malware not linked to an actor yet ]_ |
1 group listed (0 APT, 0 other, 1 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |