Alina Spark malware (Point of Sales Trojan)
Uploaded to GitHub for those who want to analyze the code.
- https://community.hpe.com/t5/Security-Research/Alina-POS-Malware/ba-p/6385271#.WOpDtrOYphG
- https://www.trendmicro.de/cloud-content/us/pdfs/security-intelligence/white-papers/wp-pos-ram-scraper-malware.pdf
- http://blog.sisainfosec.com/2015/07/pos-malware-stealth-tool-to-steal.html
- http://krebsonsecurity.com/2013/12/cards-stolen-in-target-breach-flood-underground-markets/
- https://www.trustwave.com/Resources/SpiderLabs-Blog/Alina--Casting-a-Shadow-on-POS/
- https://www.trustwave.com/Resources/SpiderLabs-Blog/Alina--Following-The-Shadow-Part-1/
- https://www.trustwave.com/Resources/SpiderLabs-Blog/Alina--Following-The-Shadow-Part-2/
- http://www.xylibox.com/2015/01/alina-sparks-source-code-review.html
- http://www.xylibox.com/2013/06/whos-behind-alina.html
- http://www.kernelmode.info/forum/viewtopic.php?f=16&t=1756