Researchers at Trend Micro have named the new malware variant as TSPY_FASTPOS.SMZTDA. The malware is used by hackers to target small and mid-sized businesses (SMBs) in many countries like France, Taiwan, Japan, Brazil, Hong Kong and United States. 
Unlike other POS malware, FastPOS does not store the information locally to send it to the cyber thieves periodically.  The variant POS malware executes the attack on the target through infected websites or through Virtual Network Computing (VNC) or via file sharing service. The stolen data is instantly transferred to the Control and Command Server that is hardcoded by the hacker. The POS malware consists of two components– a keylogger and a RAM scraper.  The logged keystrokes are stored in memory and transmitted to the attacker when the Enter key is pressed and are not stored in a file of the infected system. The stolen data can be user credentials, payment information which depends on the business procedures. The RAM scraper is devised to steal only credit card data.  The memory scraper is designed to verify the service code of the credit card to help remove out cards that demands PINS.
- "Trend Micro discovers FastPOS". Retrieved 2016-06-01.
- "Quick and Easy Credit Card Theft with FastPOS". Retrieved 2016-06-02.
- "FastPOS Malware Breaches and Delivers Credit Card Data Instantly". Retrieved 2016-06-24.
- "FastPOS malware instantly delivers stolen credit card data". Retrieved 2016-06-03.
- "FastPos uses Speed Exfiltration Technique". Retrieved 2016-06-03.
- "FastPOS Chooses Swift, Tosses Subtle". Retrieved 2016-06-07.
- "New FastPOS malware family has scatter-gun approach to data theft". Retrieved 2016-06-06.
- "FastPOS Malware works on Data Exfiltration Speed". Retrieved 2016-06-05.
- "Monthly Cyber Threat Briefing" (pdf). Retrieved 2016-06-01.
- "All about FastPOS malware - Complete Overview". Retrieved 2016-06-01.[permanent dead link]
- "FastPOS'speedy delivery of stolen credit card data". Retrieved 2016-06-06.