ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool Skimer

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: Skimer

NamesSkimer
CategoryMalware
TypeATM malware
Description(Kaspersky) Unlike Tyupkin, where there was a magic code and a specific time frame where the malware was active, Skimer only wakes up when a magic card (specific Track 2 data, see IOCs at the bottom of this blogpost) is inserted. It is a smart way to implement access control to the malware’s functionality.
Information<https://securelist.com/atm-infector/74772/>
<https://nakedsecurity.sophos.com/2009/03/17/credit-card-skimming-malware-targeting-atms/>
<https://nakedsecurity.sophos.com/2009/03/18/details-diebold-atm-trojan-horse-case/>
<https://www.wired.com/images_blogs/threatlevel/2009/06/trustwave-security-alert-atm-malware-analysis-briefing.pdf>
<https://www.wired.com/2009/06/new-atm-malware-captures-pins-and-cash/>
<https://documents.trendmicro.com/assets/white_papers/wp-cashing-in-on-atm-malware.pdf>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.skimer>
AlienVault OTX<https://otx.alienvault.com/browse/pulses?q=tag:skimer>

Last change to this tool card: 24 April 2021

Download this tool card in JSON format

All groups using tool Skimer

ChangedNameCountryObserved

Unknown groups

 _[ Interesting malware not linked to an actor yet ]_ 

1 group listed (0 APT, 0 other, 1 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]