DMSniff
Description
(Flashpoint) Point-of-sale malware previously only privately sold has been used in breaches of small- and medium-sized businesses in the restaurant and entertainment industries. The malware, known as DMSniff, also uses a domain generation algorithm (DGA) to create lists of command-and-control domains on the fly. This technique is valuable to an attacker because if domains are taken down by law enforcement, technology companies, or hosting providers, the malware can still communicate and receive commands or share stolen data.
Names
Name |
---|
DMSniff |
Category
Malware
Type
- POS malware
- Backdoor
- Credential stealer
- Botnet
Information
- https://www.flashpoint-intel.com/blog/dmsniff-pos-malware-actively-leveraged-target-medium-sized-businesses/
- https://cis.verint.com/2019/05/07/the-awakening-of-pos-malware-or-has-it-really-been-dormant/
Malpedia
Alienvault Otx
Other Information
Uuid
16da60d7-679d-44e6-b978-5256ee10f428
Last Card Change
2020-05-25