Home Malware Programs Malware Punkey Malware

Punkey Malware

Posted: June 5, 2015

Threat Metric

Threat Level: 8/10
Infected PCs: 42
First Seen: June 5, 2015
Last Seen: May 12, 2023
OS(es) Affected: Windows

The Punkey Malware, which acquires its name from the 80s sitcom 'Punky Brewster,' is a Point-of-Sale Trojan that compromises machines specialized for processing financial transactions, and then transfers collected financial data to third parties. Even one Punkey Malware infection can compromise hundreds or thousands of credit cards, and offers hackers opportunities for fraudulent transactions and identity theft without needing to target the victim's personal computer. With respect to the business systems being compromised, any anti-malware solutions employed for removing the Punkey Malware also should be capable of detecting secondary threats that may be installed by this threat.

A Financially Deadly Combination of Threats

The year's rise in PoS-based Trojans targeting businesses also has included new entries into that threat category, such as the Punkey Malware. However, despite its prominence as specialized spyware recently deployed against a confidential restaurant chain, the Punkey Malware also has some characteristics similar to those of ransomware and backdoor Trojans. Some of its major traits may include:

  • Downloading and installing other threats on the infected machine.
  • Encrypting any collected data, such as credit card numbers. Unlike many file encryptors, the Punkey Malware is expected to use this encryption to increase the sale value to different third-party organizations (instead of trying to ransom any collected information to the victims).
  • The Punkey Malware also branches out into spyware attacks of a different nature, and may log the keyboard strokes of the machine's user for collecting additional information.

The Punkey Malware also may check for updates to itself or cause other forms of network activity, that, if monitored carefully, may be identifiable as telltale signs of a threat infection. Like NewPOSThings (a similar PoS Trojan), the Punkey Malware also specifically targets devices meant for processing credit cards. Victims of compromised information may be able to identify fraudulent financial records associated with the Punkey Malware activity, and should alert any business suspected to have been compromised.

The Proper Cure to a Trojan Cocktail

The Punkey Malware comes in variants for both 32 and 64-bit versions of Windows. Although the name of the latest chain to be compromised by the Punkey Malware remains confidential, malware experts can verify that the Trojan was being distributed in October of last year. The distribution methods in use still are being examined, but past PoS Trojans have exploited out-of-date software vulnerabilities, removable devices and even disgruntled employees to gain access to a business system.

Specialized anti-malware products always should be used for uninstalling the Punkey Malware, which is a spyware product intended to avoid ready identification. A Punkey Malware infection also has a high chance of being associated with the presence of other threats installed by the Punkey Malware automatically. Most PC threats playing similar roles may downgrade the machine's security status or implement new ways of collecting information and leave few (if any) symptoms behind them.

Loading...