Daily Dark Web
  • Home
  • Cyber Attacks
  • DarkWeb News
  • Data Breaches
  • Vulnerability
  • Ransomware News
  • Unauthorized Accesses
  • Contact
No Result
View All Result
  • Home
  • Cyber Attacks
  • DarkWeb News
  • Data Breaches
  • Vulnerability
  • Ransomware News
  • Unauthorized Accesses
  • Contact
No Result
View All Result
Daily Dark Web
No Result
View All Result
Home DarkWeb News & Services

New POS Malware “ShadowPOS” Advertised in DarkWeb Forum

August 16, 2024
Reading Time: 2 mins read
New POS Malware “ShadowPOS” Advertised in DarkWeb Forum

A threat actor recently introduced a new Point of Sale (POS) malware called “ShadowPOS” on a well-known cybercrime forum. Still under development, the malware is marketed as an advanced tool designed to infiltrate POS systems, steal unencrypted credit card data, and send it to a command and control (C2) server.

Stealth and Persistence Features

The creator of ShadowPOS describes it as both highly persistent and stealthy. It scans memory at regular intervals and uploads stolen data to its C2 server. By running as a single-threaded process, the malware minimizes system resource usage, making it harder to detect.

Advanced Scanning Capabilities

ShadowPOS uses a complex algorithm that efficiently locates and verifies card data. It relies on Google’s RE2 regular expressions engine to perform high-speed memory scanning across all processes on targeted Windows-based POS systems. Unlike other POS malware, ShadowPOS scans all running processes on a terminal, significantly increasing its chances of success.

Command & Control Panel

The developer is also working on a Command & Control panel, which will allow users to manage and query stolen card data. This panel aims to streamline inventory management for those looking to sell or use the compromised information.

Exclusive Pre-Sale Offer

The threat actor is offering ShadowPOS for pre-sale with a promise of exclusivity. If purchased, the malware will not be sold as a service to others. The seller also offers to customize the malware according to the buyer’s needs.

Compliance with Forum Rules

The seller has pre-approved the post with the forum’s staff to ensure it complies with the site’s rules, which prohibit the sale of credit card information and ransomware-related tools. The seller emphasizes that the malware is not intended for ransomware attacks and does not come with any stolen card data.

 

The introduction of ShadowPOS highlights the ongoing evolution of cyber threats targeting businesses. Organizations must strengthen their security measures, including the encryption of card data and regular monitoring for unusual activity, to mitigate the risks posed by this and similar malware.

Tags: Credit CardmalwarePOSShadowPOSShopping
ShareTweet

Related Posts

‘Operation Eastwood’ Dismantles Pro-Russian DDoS Group NoName057
DarkWeb News & Services

‘Operation Eastwood’ Dismantles Pro-Russian DDoS Group NoName057

July 17, 2025
Alleged Collection of 1 Million Israeli Card Holders Data Offered for Sale
DarkWeb News & Services

Alleged Collection of 1 Million Israeli Card Holders Data Offered for Sale

July 16, 2025
The Unmasking of IntelBroker: Inside the Global Manhunt that Toppled a Cybercrime Kingpin
DarkWeb News & Services

The Unmasking of IntelBroker: Inside the Global Manhunt that Toppled a Cybercrime Kingpin

June 26, 2025
Server Access for Italian Healthcare Solutions Provider Allegedly for Sale Online
DarkWeb News & Services

Server Access for Italian Healthcare Solutions Provider Allegedly for Sale Online

June 18, 2025
Alleged Sale of Network Access Targets Critical US Industries
DarkWeb News & Services

Alleged Sale of Network Access Targets Critical US Industries

June 18, 2025
Major Darknet Marketplace Archetyp Seized Administrator Arrested
DarkWeb News & Services

Major Darknet Marketplace Archetyp Seized Administrator Arrested

June 16, 2025
Next Post
Threat Actor Claims to Sell Data of Over 1.2 Billion China Mobile Users, Including Sensitive IMEI Information

Threat Actor Claims to Sell Data of Over 1.2 Billion China Mobile Users, Including Sensitive IMEI Information

Threat Actor Allegedly Selling Network Access to Corporations, Prices Range Up to $3,000

Threat Actor Allegedly Selling Network Access to Corporations, Prices Range Up to $3,000

Recommended Stories

A Threat Actor Claims Breach of TV SAT 364/Widzew Database

A Threat Actor Claims Breach of TV SAT 364/Widzew Database

August 9, 2024
A Threat Actor Claims to Have Leaked Database of AC Propulsion Company; Exposes Over 29 Million User Records

A Threat Actor Claims to Have Leaked Database of AC Propulsion Company; Exposes Over 29 Million User Records

May 29, 2024
IntelBroker Claimed to Have Leaked Database of the Virginia Dept. of Elections

IntelBroker Claimed to Have Leaked Database of the Virginia Dept. of Elections

June 30, 2024

Popular Stories

  • Threat Actor Claims Sale of Dell Database Containing 49 Million Customer Records

    Threat Actor Claims Sale of Dell Database Containing 49 Million Customer Records

    0 shares
    Share 0 Tweet 0
  • Threat Actor Claims to Have Leaked Database Containing Personal Information of 5 Million Salvadoran Citizens

    0 shares
    Share 0 Tweet 0
  • Deloitte Allegedly Suffers Major Data Breach – Source Code and GitHub Credentials Reportedly Leaked

    0 shares
    Share 0 Tweet 0
  • Threat Actor Claims Sale of State Grid Corporation of China (SGCC) Data, World’s Largest Utility Company

    0 shares
    Share 0 Tweet 0
  • New ATM Malware Threatens European Banking Security

    0 shares
    Share 0 Tweet 0
Daily Dark Web

Daily Dark Web© 2024

No Result
View All Result
  • Contact
  • Home
  • Newsletter
  • Privacy Policy

Daily Dark Web© 2024

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?