Names | UDPoS | |
Category | Malware | |
Type | POS malware, Credential stealer | |
Description | (Forcepoint) Point of Sale malware has been around for some time and has been deployed against a broad range of businesses from retailers to hotel groups. However, this appears to be a new family which we are currently calling 'UDPoS' owing to its heavy use of UDP-based DNS traffic. At the time of writing, it's unclear whether the malware is currently being used in campaigns in the wild, although the coordinated use of LogMeIn-themed filenames and C2 URLs, coupled with evidence of an earlier Intel-themed variant, suggest that it may well be. | |
Information | <https://www.forcepoint.com/blog/x-labs/udpos-exfiltrating-credit-card-data-dns> <https://threatmatrix.cylance.com/en_us/home/threat-spotlight-inside-udpos-malware.html> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.udpos> | |
AlienVault OTX | <https://otx.alienvault.com/browse/pulses?q=tag:udp%20pos> |
Last change to this tool card: 24 May 2020
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
Unknown groups | |||||
_[ Interesting malware not linked to an actor yet ]_ |
1 group listed (0 APT, 0 other, 1 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |