Display title | Kasidet POS RAM Scraper Malware |
Default sort key | Kasidet POS RAM Scraper Malware |
Page length (in bytes) | 5,128 |
Namespace ID | 0 |
Page ID | 232514 |
Page content language | en - English |
Page content model | wikitext |
Indexing by robots | Allowed |
Number of redirects to this page | 0 |
Counted as a content page | Yes |
HandWiki item ID | None |
Edit | Allow all users (infinite) |
Move | Allow all users (infinite) |
Page creator | imported>Corlink |
Date of page creation | 16:58, 19 November 2022 |
Latest editor | imported>Corlink |
Date of latest edit | 16:58, 19 November 2022 |
Total number of edits | 1 |
Recent number of edits (within past 90 days) | 0 |
Recent number of distinct authors | 0 |
Description | Content |
Article description: (description ) This attribute controls the content of the description and og:description elements. | Kasidet POS Malware is a variant of Point of Sale (POS) Malware that performs DDoS attacks using Namecoin's Dot-Bit service to scrape payment card details. It is also known as Trojan.MWZLesson or Neutrino and was found in September 2015 by cyber security experts. It is a combination of BackDoor.Neutrino... |