• XRATOR
  • Contact Us
  • Privacy & Policy
Conquer your risk
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
Conquer your risk
No Result
View All Result
Home Cybercrime

FIN7: Unmasking the Hierarchies and Tactics of a Rising Cybercrime Syndicate

Explore the innovative attack platforms, internal hierarchies, and unique modus operandi of the globally active cybercrime syndicate, FIN7.

Gert Van de VenbyGert Van de Ven
June 2, 2023
in Articles, Cybercrime, Malware
0
Explore the innovative attack platforms, internal hierarchies, and unique modus operandi of the globally active cybercrime syndicate, FIN7.

In an era where digital threats are continuously evolving, the notorious FIN7 cybercrime syndicate is increasingly cementing its presence on the global stage. Researchers have unveiled the group’s distinctive organizational structure, extensive tactics, and deep ties within the broader cyber threat ecosystem. Recently, the syndicate has automated its attack system, further broadening its nefarious reach and fortifying its position as a major player in the ransomware landscape.

FIN7’s Sophisticated Tools and Intrusion Techniques

FIN7’s Auto-Attack System – ‘Checkmarks’

In the latest revelation, FIN7 has developed an automated attack platform called ‘Checkmarks.’ This system is designed to exploit Microsoft Exchange and SQL injection vulnerabilities, thereby enabling the group to breach corporate networks, pilfer data, and select targets for ransomware attacks based on financial size. It indicates the group’s growing adaptability and sophistication in its criminal operations.

Intrusion Techniques and Ransomware Tactics

FIN7 has been diversifying its tactics over time, employing strategies ranging from ATM attacks, hiding malware-carrying USB drives inside teddy bears, to setting up fake cybersecurity firms for ransomware attacks. Today, its strategy revolves around the careful selection of high-value companies already compromised, pressuring them to pay hefty ransoms or finding innovative ways to monetize their data and remote access. This targeted approach reflects a new level of sophistication in their illicit activities.

Global Reach and Victim Selection

FIN7’s activities span across the globe, with over 8,147 victims documented so far. The United States remains a primary target, but the group has also attacked businesses in China, Germany, Canada, Italy, and the U.K. New victims are automatically added to a central panel where FIN7 operators can see additional details about the compromised endpoint, demonstrating the group’s ambitions to expand its nefarious activities far and wide.

The Distinctive Modus Operandi of FIN7

Due Diligence and Target Evaluation

In an original approach, FIN7’s internal ‘marketing’ team scrutinizes new entries, collecting information from diverse sources like Owler, Crunchbase, DNB, Zoominfo, MuStat, and Similarweb to evaluate a firm’s size and financial status. They then add comments on the Checkmarks platform to list victims’ current revenue, number of employees, domain, headquarters details, and other information, aiding in determining whether the firm is worth the time and effort of a ransomware attack.

Post-Exploitation and Retargeting

Once the access is obtained, FIN7 follows a sequence of exfiltrating data, encrypting files, and then determining the ransom amount based on the company’s revenue. It also deploys SSH backdoors on compromised systems, even after a ransom is paid. This enables them to resell access to other ransomware groups and re-target victims in its illicit money-making scheme. By doing so, the group maximizes profits while exerting minimal effort.

Connections with Other Ransomware Gangs

Evidence suggests that FIN7 has links with multiple ransomware gangs, including Darkside, REvil, and LockBit. The retrieved Jabber logs reveal abundant evidence of communications with these groups, further indicating FIN7’s extensive affiliations within the cybercrime ecosystem.

The Organizational Structure of FIN7

Team Structure and Roles

Interestingly, FIN7 operates much like a traditional company, with a team structure that includes top-level management, developers, pentesters, affiliates, and marketing teams. These individuals are assigned specific roles and responsibilities, indicating a high level of organization within the syndicate.

Key Players and Coercive Practices

The key players of FIN7 include individuals named Alex (“The Manager”) and Rash (“The Tech Lead”), while another member named Sergey-Oleg (“The Targeter”) is tasked with overseeing the group’s operations. However, disturbingly, operators in administrative positions engage in intimidation and threats to ensure their team members’ compliance and deter them from shirking responsibilities.

Conclusion

FIN7 represents a major threat in the global cybercrime landscape, boasting an intricate organizational hierarchy, an innovative automated attack platform, and increasingly sophisticated ransomware tactics. It’s strongly recommended for admins to familiarize themselves with the group’s techniques and indicators of compromise (IOCs) to protect their networks against these escalating threats.

Tags: Checkmarks PlatformCyber Threat EcosystemDarkSideDarkSide RansomwareFIN7HackingMicrosoft ExchangeransomwareREvilREvil RansomwareSQL Injection

Categories

  • Cybercrime
  • Malware
  • Vulnerability & Weakness
  • Threat Intelligence
  • Cyber Attacks
  • Cybersecurity
  • Offensive Security
  • Risk Management
  • Cyberdefense
  • Cyber Insurance

Popular News

  • Cybercriminals regularly hack into individual and organization network. They may steal password to sell them on the darkweb.

    4 websites to check if your password is in the darkweb

    0 shares
    Share 0 Tweet 0
  • 10 Essential Tools for IoT Pentesting

    0 shares
    Share 0 Tweet 0
  • Threat Modeling : from Software Security to Cyber Risk Management

    0 shares
    Share 0 Tweet 0
  • 8 TV Shows and Movies about Personal Data Abuse

    0 shares
    Share 0 Tweet 0
  • The Code Knight: Mastering the Craft of Defensive Programming

    0 shares
    Share 0 Tweet 0

"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.

Categories

  • Articles
  • Cyber Attacks
  • Cyber Insurance
  • Cybercrime
  • Cyberdefense
  • Cybersecurity
  • Malware
  • News
  • Offensive Security
  • Research
  • Risk Management
  • Scams
  • State of the art
  • Threat Intelligence
  • Uncategorized
  • Vulnerability & Weakness

Quick Links

  • XRATOR
  • Our Experts
  • Privacy Policy
  • Contact Us

XRATOR® – copyright 2020-2021

No Result
View All Result
  • Contact Us
  • Homepages

© 2018 JNews by Jegtheme.

Manage Cookie Consent
We use cookies to optimize our website and our service.
By closing this windows, you automatically deny non-functionals cookies.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}
Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}