Sunday, June 15, 2025
HomeComputer SecurityGlitchPOS - Hackers Selling a New POS Malware On Dark Web...

GlitchPOS – Hackers Selling a New POS Malware On Dark Web Forums

Published on

SIEM as a Service

Follow Us on Google News

Threat actors selling a new POS malware dubbed GlitchPOS aimed in exfiltrating the credit card numbers from Point-of-sale devices and retailers’ websites. Most of the POS devices running with Windows or Unix, GlitchPOS malware targets the windows variants.

Security researchers from Talos discovered the distribution of the new PoS malware that hackers selling in the dark web forums and it’s associated payloads, infrastructure and control panel.

The malware packer developed in visual basic, disguised as a fake game, the packer adds protection to the malware, it decodes to a library that packed with UPX packer(ultimate packer for eXecutables). Once the UPK packer decodes then the final malware “GlitchPOS” which is a memory grabber that developed in VisualBasic.

- Advertisement - Google News
GlitchPOS

Following are the Payload Functions

  • Register the infected systems
  • Receive tasks (command execution in memory or on disk)
  • Exfiltrate credit card numbers from the memory of the infected system
  • Update the exclusion list of scanned processes
  • Update the “encryption” key
  • Update the User Agent
  • Clean itself

Once the malware gets deployed in the system it connects with the C2 server to receive commands from the attackers via a shellcode and the communication is encrypted by XORed. The intended purpose of the malware is to steal the credit card numbers from the memory of the infected system.

Threat actors posted additional screenshots to boost the sale of the malware that includes clients list and the card’s date. The built malware is sold for $80, the builder $600 and gate address change for $80.

GlitchPOS

Researchers believe there is a similarity between GlitchPOS and DiamondFox L!NK botnet, they also spotted the same malware available after 25 days in the alternative forum with higher prices.

“The sale opened a few weeks ago, so we don’t know yet how many people bought it or use it. We also see that bad guys steal the work of each other and try to sell malware developed by other developers at a higher price.”

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

PoS Malware Ultimately Designed to Steal Credit Card Details Through DNS Requests

Recent POS malware attacks signal a need for app security for mobile payments

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...