ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool NitlovePOS

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: NitlovePOS

NamesNitlovePOS
nitlove
CategoryMalware
TypePOS malware, Credential stealer
Description(FireEye) The NitlovePOS malware can capture and ex-filtrate track one and track two payment card data by scanning the running processes of a compromised machine. It then sends this data to a webserver using SSL.

We believe the cybercriminals assess the hosts compromised via indiscriminate spam campaigns and instruct specific victims to download the POS malware.
Information<https://www.fireeye.com/blog/threat-research/2015/05/nitlovepos_another.html>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.nitlove>
AlienVault OTX<https://otx.alienvault.com/browse/pulses?q=tag:nitlovepos>

Last change to this tool card: 28 December 2022

Download this tool card in JSON format

All groups using tool NitlovePOS

ChangedNameCountryObserved

Unknown groups

 _[ Interesting malware not linked to an actor yet ]_ 

1 group listed (0 APT, 0 other, 1 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]