OpGhoul (Malware Family) By Fraunhofer FKIE Archived: 2026-04-05 19:47:59 UTC win.opghoul (Back to overview) OpGhoul This entry serves as a placeholder of malware observed during Operation Ghoul. The samples will likely be assigned to their respective families. Some families involved and identified were Alina POS (Katrina variant) and TreasureHunter POS. References 2016-08-17 ⋅ Kaspersky Labs ⋅ Mohamad Amin Hasbini Operation Ghoul: targeted attacks on industrial and engineering organizations OpGhoul 2016-08-17 ⋅ Kaspersky Labs ⋅ Mohamad Amin Hasbini Operation Ghoul: targeted attacks on industrial and engineering organizations OpGhoul Operation Ghoul There is no Yara-Signature yet. Source: https://malpedia.caad.fkie.fraunhofer.de/details/win.opghoul https://malpedia.caad.fkie.fraunhofer.de/details/win.opghoul Page 1 of 1