FighterPOS

Description

(FireEye) The functionality of FighterPOS is similar to other PoS malware families we’ve seen in the past. It is capable of collecting credit card track 1, track 2, and CVV codes. The malware also contains a RAM scraping functionality, commonly seen in many PoS malware families. Additionally, its keylogger functionality allows the attacker to log all keystrokes on the infected terminal. The code for the RAM scraping functionality is similar to that found in NewPosThings.

Names

Name
FighterPOS

Category

Malware

Type

  • POS malware
  • Keylogger
  • Credential stealer

Information

Alienvault Otx

Other Information

Uuid

0c335fb3-efae-430c-80fa-85fd5ec41be4

Last Card Change

2020-05-24