Tuesday, July 16, 2024
EHA

FIN8 APT Hackers Attacks Financial Institutions Using Sophisticated Backdoor

The security analysts from the cybersecurity firm Bitdefender have recently noted the new backdoor BADHATCH malware that was being used by the very well-known threat actor, FIN8.

However, this is not the first time that FIN8 has been initiating any attack, as per the report these APT threat actors were targeting victims since 2016. 

Well, this APT group is famous for taking elongated breaks to adjust their methods, and procedures (TTP) as it helps them to boosts their success rate.

Tried and True Methods of FIN8  

The APT group FIN8 always targets the financial services, as well as the POS systems, which are the main targets of this group. Apart from this the FIN8 generally uses built-in tools and interfaces, so that they can easily misuse legal services such as sslip.io. 

FIN8 is very famous for its defined capabilities, it has a mixture of such abilities and that’s what makes it a strong and dangerous APT group.

All the operations that are implemented by the threat actors of the FIN8 group are very professional, thus the experts have claimed that sometimes it becomes quite difficult to identify the threat.

Analysis of an Attack

The security researchers are yet not clear about all the details of this malware, but they are trying to think about a conclusion based on the previous attacks that were initiated by the FIN8 group. 

However, after so many examinations, it’s quite clear that the FIN8 APT group mostly prefers the methods that were generally used by the engineer.

Network Reconnaissance and Lateral Movement 

After a long investigation, it has been clear that in this attack at least two user accounts were negotiated by the threat actors. However, the analysts have noted the very first indication of a compromise that was caught on one of the database servers. 

Not only this during the attack the threat actors were also engaged in network reconnaissance and regained a list of conferred domains as well as a list of domain controllers that have the commands we have mentioned below:-

  • nltest.exe /domain_trusts
  • nltest.exe /dclist:<domain>

Once the initial reconnaissance has been done, the threat actors scattered all over the network and start developing their space by targeting domain controllers. However, the threat actors also get engaged in lateral movement by utilizing the WMIC utility for remote code execution.

Recommendations

Apart from this, the cybersecurity authorities have suggested some recommendations that are to be followed carefully, as they will surely reduce the impact of financial malware:-

  • At first, separate the POS network from the ones that were being used by the employees or guests
  • After that start the cybersecurity awareness training for employees, as it will help them detect phishing e-mails.
  • Next tune the e-mail security solution to automatically discard malicious or unusual attachments.
  • Combine the threat intelligence into current SIEM or security controls for proper Indicators of Agreement.
  • Lastly, the organization that does not have a strong security team should go for the outsourcing security

Moreover, the organizations must follow all the recommendations that are suggested by the security executives to stay strong and to keep themselves safe from such attacks.

Follow us on LinkedinTwitterFacebook for daily Cybersecurity News & Updates

Website

Latest articles

Critical Cellopoint Secure Email Gateway Flaw Let Attackers Execute Arbitrary Code

A critical vulnerability has been discovered in the Cellopoint Secure Email Gateway, identified as...

Singapore Banks to Phase out OTPs for Bank Account Logins Within 3 Months

The Monetary Authority of Singapore (MAS) and The Association of Banks in Singapore (ABS)...

GuardZoo Android Malware Attacking military personnel via WhatsApp To Steal Sensitive Data

A Houthi-aligned group has been deploying Android surveillanceware called GuardZoo since October 2019 to...

ViperSoftX Weaponizing AutoIt & CLR For Stealthy PowerShell Execution

ViperSoftX is an advanced malware that has become more complicated since its recognition in...

Malicious NuGet Campaign Tricking Developers To Inject Malicious Code

Hackers often target NuGet as it's a popular package manager for .NET, which developers...

Akira Ransomware Attacking Airline Industry With Legitimate Tools

Airlines often become the target of hackers as they contain sensitive personal and financial...

DarkGate Malware Exploiting Excel Files And SMB File Shares

DarkGate, a Malware-as-a-Service (MaaS) platform, experienced a surge in activity since September 2023, employing...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles