Skimmer malware family was the first to target devices throughout the world. The malicious program is implemented as a dynamic link library loaded by an infected application. When launched, the backdoor picks the name for the log file that will contain the stolen information about transactions. Its usual operation was to wait for a legitimate user authorisation, when it happend it reads and saves the Track 2 data (which includes the card/account number, expiry date, and service code) and the PIN code into its log file, hence the name Skimmer. ATM manufacturers employ a special technology that facilitates the encrypted transmission of PIN codes entered into ATMs, and the encryption key is regularly updated from the bank's server. Skimer bypasses this protection and uses the ATM's software to decrypt PIN codes. This information then latter retrieved and used by the attacker.
34e7060e7a0c0ba24fcb55c641e5b586cef744e10ebd5a9f73ecd2ed2f4e9c1f | Backdoor.Win32.Skimer.l | Download |
b39c5992c2cb70c76c82d6fba3cc0b7972c2f9b35227934b766e810f20a5f053 | Backdoor.Win32.Skimer.u | Download |
b51973c530802ae19df8ac4d9643fc3317952242d9d42f951e094c72d730dd66 | Trojan-Spy.Win32.POSCardStealer.bp | Download |
265f7a2ae7c931db0da8598ebb496d9e308be549b48909115039120b326ce50e | A Variant Of Win32/Skimer.D | Download |
ac8e8216e71e078198ef67d4cb48118767d0696610a02137492814422153d3c6 | Backdoor.Win32.SkimerNC.a | Download |
359bb8596e4befafdaca706630bec598400694305622c116acdfa59074f1858e | Backdoor.Win32.SkimerNC.a | Download |
4941331c64e0389d5ec966122ef71a99d8f9830f13e9afa758e03275f896c2eb | HEUR:Trojan.Win32.Generic | Download |
5ab6358e1886655257c437ebad71b98a6575313b2f9327359661aac5d450c45a | Backdoor.Win32.Skimer.v | Download |
653701d02c5d8d39b3da9b0848d20921cd65ea28e77c8e9254e222601264bcc6 | HEUR:Trojan.Win32.Generic | Download |
d90257af70401984d5d41dd057114df88566d00329874ced3103a6f8cd1991e5 | Trojan.Win32.Skimer.b | Download |
2721a5a6478bfff2c5de0d105623ba5f411401bbd92bd3e2bee4c51c2d12f5a8 | Trojan-Spy.Win32.POS.bo | Download |
6efedf9bde951ad6c3e240ec498767bb693ecc8fa62040e624c5a7fa21c5bdaa | Trojan-Spy.Win32.Plotus.a | Download |
7888e9a27b27f026f09997414504be5822f35b69ddec826eb2a56f6347e2d147 | HEUR:Trojan.Win32.Generic | Download |
cde6f7fb2fbdefffe22a012295ab157cffc07cab26ba0e34ced0bae484355187 | HEUR:Trojan.Win32.Generic | Download |