Thursday, February 27, 2025
HomeCyber AttackFIN7 APT Hackers Added New Hacking Tools in Their Malware Arsenal to...

FIN7 APT Hackers Added New Hacking Tools in Their Malware Arsenal to Evade AV Detection

Published on

SIEM as a Service

Follow Us on Google News

Researchers discovered 2 new hacking tools called BOOSTWRITE and RDFSNIFFER that were added in FIN7 groups malware arsenal with sophisticated capabilities and techniques.

FireEye Mandiant investigators uncovered that these new hacking tools were added for hijacking the DLL load order of the legitimate Aloha utility and load the malware.

The Tool named BOOSTWRITE is a payload dropper that was employed to decrypt the embedder payloads using the specific decryption key from the command & control server and is highly capable of evading Antivirus detection.

Another tool called RDFSNIFFER is a payload of BOOSTWRITE that was developed to perform an unauthorized alteration with Aloha Command Center client, a remote administrator software designed by NCR Corporation and is mainly used in payment cards processing sectors.

BOOSTWRITE using various Tactics, Techniques, and Procedures (TTP’s) such as Code Signing, Execution through Module Load, Deobfuscate,
Data Encrypted, DLL Hijacking and more.

FIN7’s Loader “BOOSTWRITE”

Threat actors abuse the DLL search order that loads the legitimate ‘Dwrite.dll’ that loaded by applications.

During the infection routine, BOOSTWRITE placed on file system alongside the RDFClient binary which helps the loader to force the application to import DWriteCreateFactory instead of legitimate DWrite.dll.

According to FireEye research ” The malware decrypts and loads two payload DLLs. One of the DLLs is an instance of the CARBANAK backdoor; the other DLL is a tool tracked by FireEye as RDFSNIFFER which allows an attacker to hijack instances of the NCR Aloha Command Center Client application and interact with victim systems via existing legitimate 2FA sessions. “

RDFSNIFFER With RAT Feature

RDFSNIFFER dropped by BOOSTWRITE which allows an attacker to tamper the legitimate connections via RDFClient, and alter the DLL to hijack elements of its user-interface.

“This module also contains a backdoor component that enables it to inject commands into an active RDFClient session. This backdoor allows an attacker to upload, download, execute and/or delete arbitrary files”

Evade the Detection

 Mandiant investigation identified that the BOOSTWRITE was signed using a code signing certificate issued by MANGO ENTERPRISE LIMITED and it was uploaded to VirusTotal on October 3.

“It is not a completely new technique for FIN7 as the group has used digital certificates in the past to sign their phishing documents, backdoors, and later stage tools,” FireEye said.

Researchers believe that the actors behind these tools are actively altering this malware to avoid traditional detection mechanisms.

FIN7 increases their chances of bypassing various security controls and successfully compromising victims by exploiting the trust, inherently provided by code certificates.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data

A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver...

Ghostwriter Malware Targets Government Organizations with Weaponized XLS File

A new wave of cyberattacks attributed to the Ghostwriter Advanced Persistent Threat (APT) group...

LCRYX Ransomware Attacks Windows Machines by Blocking Registry Editor and Task Manager

The LCRYX ransomware, a malicious VBScript-based threat, has re-emerged in February 2025 after its...

Threat Actors Using Ephemeral Port 60102 for Covert Malware Communications

Recent cybersecurity investigations have uncovered a sophisticated technique employed by threat actors to evade...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Ghostwriter Malware Targets Government Organizations with Weaponized XLS File

A new wave of cyberattacks attributed to the Ghostwriter Advanced Persistent Threat (APT) group...

Threat Actors Using Ephemeral Port 60102 for Covert Malware Communications

Recent cybersecurity investigations have uncovered a sophisticated technique employed by threat actors to evade...

Poseidon Mac Malware Hiding Within PKG Files to Evade Detections

A recent discovery by cybersecurity researchers has revealed that the Poseidon malware, a macOS-targeting...