Names | Multigrain Multigrain POS | |
Category | Malware | |
Type | POS malware, Credential stealer | |
Description | (FireEye) FireEye recently discovered a new variant of a point of sale (POS) malware family known as NewPosThings. This variant, which we call “MULTIGRAIN”, consists largely of a subset of slightly modified code from NewPosThings. The variant is highly targeted, digitally signed, and exfiltrates stolen payment card data over DNS. The addition of DNS-based exfiltration is new for this malware family; however, other POS malware families such as BernhardPOS and BlackPOS have used this technique in the past. | |
Information | <https://www.fireeye.com/blog/threat-research/2016/04/multigrain_pointo.html> <https://www.pandasecurity.com/mediacenter/malware/multigrain-malware-pos/> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.multigrain_pos> | |
AlienVault OTX | <https://otx.alienvault.com/browse/pulses?q=tag:multigrain> |
Last change to this tool card: 24 May 2020
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
Unknown groups | |||||
_[ Interesting malware not linked to an actor yet ]_ |
1 group listed (0 APT, 0 other, 1 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |