0% found this document useful (0 votes)
169 views1 page

SUCEFUL ATM Malware Overview

This document summarizes an ATM malware called SUCEFUL that can steal debit card information and even steal the physical cards. It lists two known MD5 hashes associated with the Backdoor.ATM.Suceful malware. The malware raises the sophistication of threats targeting cardholders.

Uploaded by

Yaoming meeyagi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
169 views1 page

SUCEFUL ATM Malware Overview

This document summarizes an ATM malware called SUCEFUL that can steal debit card information and even steal the physical cards. It lists two known MD5 hashes associated with the Backdoor.ATM.Suceful malware. The malware raises the sophistication of threats targeting cardholders.

Uploaded by

Yaoming meeyagi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd

SUCEFUL is the first multi-vendor ATM Malware targeting cardholders, created to

steal the tracks of the debit cards but also to steal the actual physical cards,
which is definitely raising the bar of sophistication of this type of threats.
List of known MD5s

4bdd67ff852c221112337fecd0681eac - Backdoor.ATM.Suceful
f74755b92ffe04f97ac506960e6324bb - Backdoor.ATM.Suceful

[1] Ploutus: http://www.symantec.com/connect/blogs/texting-atms-cash-shows-


cybercriminals-increasing-sophisticatio

[2] Padpin: https://www.symantec.com/security_response/writeup.jsp?docid=2014-


051213-0525-99&tabid=2

[3] WOSA/XFS: http://www.cen.eu/work/areas/ict/ebusiness/pages/ws-xfs.aspx

bnr-mandiant-advantage-v2-315x315
Email Updates

Information and insight on today's advanced threats from FireEye.


Threat Research Blog
FireEye Stories Blog
Industry Perspectives Blog
Yes, I would like to receive communications from FireEye. Please read more about
our information collection and use.
Share
AddThis Sharing Buttons
Share to LinkedIn
Share to TwitterShare to FacebookShare to Email
Recent Posts

08 Dec 2020
Unauthorized Access of FireEye Red Team Tools

01 Dec 2020
Using Speakeasy Emulation Framework Programmatically to Unpack Malware

22 Nov 2020
Election Cyber Threats in the Asia-Pacific Region

RSS Feed: Stay

You might also like