Names | GetMyPass | |
Category | Malware | |
Type | POS malware, Credential stealer | |
Description | (securitykitten) To run this malware successfully the attacker would need several pieces of information: • Credentials • Name of the POS executable / service • A method for moving the data out of the network This malware seems to be in its infancy. There are debug strings still existent in the malware indicate to me that the author is still testing the tool or is still actively developing it. | |
Information | <https://securitykitten.github.io/2014/11/26/getmypass-point-of-sale-malware.html> <https://securitykitten.github.io/2015/01/08/getmypass-point-of-sale-malware-update.html> <https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/the-evolution-of-point-of-sale-pos-malware> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.getmypass> |
Last change to this tool card: 22 May 2020
Download this tool card in JSON format
Previous: GetMail
Next: Gh0stnet
Changed | Name | Country | Observed | ||
Unknown groups | |||||
![]() | _[ Interesting malware not linked to an actor yet ]_ |
1 group listed (0 APT, 0 other, 1 unknown)
Thailand Computer Emergency Response Team (ThaiCERT) Follow us on![]() ![]() |
Report incidents |
|
![]() |
+66 (0)2-123-1234 | |
![]() |
report@thaicert.or.th | |
![]() |
Download PGP key |