FIN6 cybercrime group tied with a LockerGoga and Ryuk ransomware that targets the enterprise network in an
Researchers from FireEye recently learning this incident from their customer’s network and the further investigation reveals that the FIN6 group was in the Initial stage of attack.
FIN6 using publicly available tools such as Cobalt Strike, Metasploit, Adfind and 7-Zip to conduct internal reconnaissance, compress data and other operation to gain the network access.
Lockergoga infection was first spotted in January 2019, the ransomware particularly targets on critical infrastructure, and the Ryuk Ransomware campaign targeting various enterprise network around the globe and encrypting various data in storage, personal computers, and data center.
Researchers Stated that “Our team quickly linked this activity with some recent Mandiant investigations and enabled us to determine that FIN6 has expanded their criminal enterprise to deploy ransomware in an attempt to further monetize their access to compromised entities.”
FIN6 Infection Life Cycle
Initially, FIN6 compromise the internet facing system to gain access to the enterprise environment using stolen credentials and move to the further internal network by abusing the Windows Remote Desktop Protocol.
In this case, Attackers are using 2 different technique to intrude the targeted network.
Cobalt Strike was actually configured to download the second payload from
Second Technique, Attackers abusing the Windows services which are random name service that is using Metasploit.
The Metasploit reverse HTTP payload was configured to communicate with the command and control (C2) IP address to download the additional payload.
According to FireEye Report, To achieve privilege escalation within the environment, FIN6 utilized a named pipe impersonation technique included within the Metasploit framework that allows for SYSTEM-level privilege escalation.
Through separate Mandiant Incident Response investigations, FireEye has observed FIN6 conducting intrusions to deploy either Ryuk or LockerGoga ransomware.
You can Also Download Free E-book to learn about complete Enterprise Security Mitigation & Implementation Steps – Download Free-Ebook Here.
Indicator of Compromise