FIN7

From Wikipedia, the free encyclopedia
FIN7
Formation2015
TypeHacking
AffiliationsBlackCat

FIN7, also called Carbon Spider, ELBRUS, or Sangria Tempest,[1] is a Russian criminal advanced persistent threat group that has primarily targeted the U.S. retail, restaurant, and hospitality sectors since mid-2015. A portion of FIN7 is run out of the front company Combi Security. It has been called one of the most successful criminal hacking groups in the world.[2] FIN7 is also associated with GOLD NIAGARA, ITG14, ALPHV and BlackCat.[3][4]

History[edit]

In March 2017 FIN7 engaged in a spearfishing campaign of company employees involved with SEC filings.[5]

In August 2018 three members of FIN7 were charged by the United States Department of Justice for cybercrimes that impacted more than 100 U.S. companies.[6]

In November 2018 it was reported that FIN7 were behind data breaches of Red Robin, Chili's, Arby's, Burgerville, Omni Hotels and Saks Fifth Avenue.[7]

In March 2020, the FBI issued a warning that members of FIN7 have been targeting companies in the retail, restaurant, and hotel industries with BadUSB attacks designed to deliver REvil or BlackMatter ransomware.[8] Packages have been sent to employees in IT, executive management, and human resources departments.[8] One intended target was sent a package in the mail which contained a fake gift card from Best Buy as well as a USB flash drive with a letter stating that the recipient should plug the drive into their computer to access a list of items that could be purchased with the gift card.[8][9] When tested, the USB drive emulated a keyboard, and then initiated a series of keystrokes which opened a PowerShell window and issued commands to download malware to the test computer, and then contacted servers in Russia.[8][9]

In December 2020 it was reported that FIN7 may be a close collaborator of Ryuk.[10]

In April 2021 a "high-level manager" of FIN7 Fedir Hladyr from Ukraine was sentenced to 10 years of prison in the United States after he pleaded guilty to charges of conspiracy to commit wire fraud and one count of conspiracy to commit computer hacking.[11][12]

In January 2022, the FBI issued a warning that members of FIN7 have been targeting transportation and insurance companies (since August 2021), and defense companies (since November 2021), with BadUSB attacks designed to deliver REvil and or BlackMatter ransomware.[13][14] The intended targets were sent USB drives in packages claiming to be from Amazon or the United States Department of Health and Human Services, with letters talking about free gift cards or COVID-19 protocols that were purportedly further explained by information on the USB drive.[13][14] When plugged in, the USB drives emulate a keyboard, and then initiate a series of keystrokes which open a PowerShell window and issue commands to download malware.[13][14]

In 2021 the group began using software known as ALPHV written in Rust, which was offered to affiliates as Ransomware as a Service.[4][15]

In February 2023 the group was named in the Irish High Court as being behind the Munster Technological University ransomware attack.[16]

References[edit]

  1. ^ "How Microsoft names threat actors". Microsoft. Retrieved 21 January 2024.
  2. ^ "Fin7: The Billion-Dollar Hacking Group Behind a String of Big Breaches". Wired. ISSN 1059-1028. Retrieved 2021-03-15.
  3. ^ "FIN7, GOLD NIAGARA, ITG14, Carbon Spider, Group G0046 | MITRE ATT&CK®". attack.mitre.org. Retrieved 2022-03-01.
  4. ^ a b Scroxton, Alex (2022-09-22). "ALPHV/BlackCat ransomware family becoming more dangerous". Computer Weekly. Retrieved 2023-02-12.
  5. ^ "FIN7 Spear Phishing Campaign Targets Personnel Involved in SEC Filings". FireEye. Archived from the original on 2021-04-19. Retrieved 2021-03-15.
  6. ^ "Three Members of Notorious International Cybercrime Group "Fin7" In Custody for Role in Attacking Over 100 U.S. companies". www.justice.gov. 2018-08-01. Retrieved 2021-03-15.
  7. ^ Gorelik, Michael. "FIN7 Not Finished – Morphisec Spots New Campaign". blog.morphisec.com. Retrieved 2021-03-15.
  8. ^ a b c d Ilascu, Ionut (2020-03-27). "FBI: Hackers Sending Malicious USB Drives & Teddy Bears via USPS". Bleeping Computer. This is not a one-off incident, though. The FBI warns that FIN7 has mailed these packages via USPS to numerous businesses (retail, restaurant, hotel industry) where they target employees in human resources, IT, or executive management departments. These packages sometimes include "gifts" like teddy bears or gift cards. These USB drives are configured to emulate keystrokes that launch a PowerShell command to retrieve malware from server controlled by the attacker. Then, the USB device contacts domains or IP‌ addresses in Russia.
  9. ^ a b Cimpanu, Catalin (March 26, 2020). "Rare BadUSB attack detected in the wild against US hospitality provider". ZDNet. Archived from the original on 2020-03-26. Retrieved 2021-09-07.
  10. ^ "Collaboration between FIN7 and the RYUK group, a Truesec Investigation". TRUESEC Blog. 2020-12-22. Retrieved 2021-03-15.
  11. ^ "High-level organizer of notorious hacking group FIN7 sentenced to ten years in prison for scheme that compromised tens of millions of debit and credit cards". www.justice.gov. 2021-04-16. Retrieved 2021-04-22.
  12. ^ Palmer, Danny. "'High-level' organiser of FIN7 hacking group sentenced to 10 years in prison". ZDNet. Retrieved 2021-04-22.
  13. ^ a b c Gatlan, Sergiu (2022-01-07). "FBI: Hackers use BadUSB to target defense firms with ransomware". Bleeping Computer. FIN7 operators impersonated Amazon and the US Department of Health & Human Services (HHS) to trick the targets into opening the packages and connecting the USB drives to their systems. Since August, reports received by the FBI say that these malicious packages also contain letters about COVID-19 guidelines or counterfeit gift cards and forged thank you notes, depending on the impersonated entity.
  14. ^ a b c Tung, Liam (2022-01-10). "Ransomware warning: Cyber criminals are mailing out USB drives that install malware". ZDNET.
  15. ^ "2022-004: ACSC Ransomware Profile – ALPHV (aka BlackCat)". Australian Cyber Security Centre. 2022-04-14. Retrieved 2023-02-12.
  16. ^ Moore, Jane; O'Connor, Niall. "MTU Cork confirms hackers have encrypted university data and demanded a ransom". TheJournal.ie.