Names | NitlovePOS | |
Category | Malware | |
Type | POS malware, Credential stealer | |
Description | (FireEye) The NitlovePOS malware can capture and ex-filtrate track one and track two payment card data by scanning the running processes of a compromised machine. It then sends this data to a webserver using SSL. We believe the cybercriminals assess the hosts compromised via indiscriminate spam campaigns and instruct specific victims to download the POS malware. | |
Information | <https://www.fireeye.com/blog/threat-research/2015/05/nitlovepos_another.html> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.nitlove> | |
AlienVault OTX | <https://otx.alienvault.com/browse/pulses?q=tag:nitlovepos> |
Last change to this tool card: 24 May 2020
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
Unknown groups | |||||
![]() | _[ Interesting malware not linked to an actor yet ]_ |
1 group listed (0 APT, 0 other, 1 unknown)
Thailand Computer Emergency Response Team (ThaiCERT) Follow us on![]() ![]() |
Report incidents |
|
![]() |
+66 (0)2-123-1234 | |
![]() |
report@thaicert.or.th | |
![]() |
Download PGP key |