Thursday, August 18, 2022
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

FIN7 hacking group returns with new methods and members, what should you look out for?

Researcher by Researcher
April 10, 2022
in Cybersecurity
0
FIN7 hacking group returns with new methods and members, what should you look out for?
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


Based on new findings the group is now employing various cyberattack methods, from ransomware to backdoors.

Malware and hacking
Image: Getty Images/iStockphoto

A report from Mandiant details the resurfacing of the FIN7 hacking group and the collective’s use of new hacking tools along with an expanding roster of attackers. The group, also known as Carbanak, has allegedly been tying together several uncategorized (UNC) hacking teams under the FIN7 umbrella and has been linked to ransomware implementers such as REvil, Darkside, Blackmatter and ALPHV.

These revelations have also pointed towards a broadening of the FIN7 group’s approach and targets for hacking as well. Whereas in the past the organization had aimed at businesses in the retail and hospitality sectors, the group has seen “notable shifts in activity, including their use of novel malware, incorporation of new initial access vectors, and likely shift in monetization strategies.”

How are FIN7’s methods changing?

FIN7, much like the other hacking groups it is now associated with, has begun leveraging a new backdoor called Powerplant and a downloader called Birdwatch for accessing systems. The group then leverages password reuse for software supply chain attacks, one of the FIN7’s new areas to target. In addition, it is believed that the group has been engaged in data theft and ransomware deployment themselves, indicating the links to more well-known hacking collectives.

Must-read security coverage

“Initial access vectors are becoming more varied and devious and it’s unlikely that any organization can go without falling victim indefinitely,” said Chris Clements, VP of solutions architecture at Cerberus Sentinel. “The question organizations need to ask themselves is ‘what’s next’ in their defense. For far too many organizations the answer begins and ends with endpoint protection like antivirus or [endpoint detection and response]. That brings us to the second key point from the research, namely that threat actors are becoming incredibly sophisticated with implants and malware that bypass many if not all endpoint detection solutions. Understand these two key points and it’s no longer a mystery why just so many institutions fall victim to ransomware and other cyberattacks.”

Mandiant estimates that up to 17 UNCs may be associated with FIN7 to varying degrees, making the group harder to track due to its numerous members and differing methods of hacking, from ransomware to malware and backdoors.

SEE: Password breach: Why pop culture and passwords don’t mix (free PDF) (TechRepublic)

Ways to avoid falling victim to a cyberattack

“With over 8.4 million passwords in the wild and over 3.5 billion of those passwords tied to actual email addresses, it provides a starting point and easy attack vector for cybercriminals to target various organizations, especially those heavily utilized in a supply chain process,” said James McQuiggan, Security Awareness Advocate at KnowBe4. “Organizations need to protect their users and remote accounts by requiring multi-factor (MFA) authentication from an authenticator app or a hardware token. This action will significantly reduce the risk of unauthorized access via a reused password that could lead to a data breach or ransomware attack.”

As McQuiggan notes, one method for organizations to avoid falling victim through use of MFA to ensure passwords are being properly protected. Additional processes users can take include employing best practices or using password managers when it comes to storing sensitive information. Making sure to have a variety of different passwords used can also prove useful, so that multiple systems cannot be corrupted in case one set of login credentials are compromised. Lastly, always operating with a healthy dose of skepticism can be effective when receiving emails or notifications from unverified sources.



Source link

Related articles

Spring Framework Flaw Exploited in Mirai Malware Attacks

CISA Warns of Ongoing Exploitation Against Zimbra Flaws

August 18, 2022
High-Severity Flaw in Argo CD is Information Leak Risk

Apple Patches New macOS, iOS Zero-Days

August 18, 2022
Tags: FIN7GrouphackingmembersmethodsReturns
Share76Tweet47

Related Posts

Spring Framework Flaw Exploited in Mirai Malware Attacks

CISA Warns of Ongoing Exploitation Against Zimbra Flaws

August 18, 2022
0

Attackers are exploiting multiple, previously disclosed flaws that impact Zimbra’s enterprise collaboration software and email platform, warned the Cybersecurity and...

High-Severity Flaw in Argo CD is Information Leak Risk

Apple Patches New macOS, iOS Zero-Days

August 18, 2022
0

Apple on Wednesday rolled out emergency patches for a pair of already exploited zero-day vulnerabilities in its flagship macOS and...

Seaborgium targets sensitive industries in several countries

Seaborgium targets sensitive industries in several countries

August 17, 2022
0

Image: Adobe Stock New research from Microsoft Threat Intelligence Center (MSTIC) sheds light on a cyberespionage threat actor known as...

DEF CON – “don’t worry, the elections are safe” edition

DEF CON – “don’t worry, the elections are safe” edition

August 17, 2022
0

Don’t worry, elections are safe. Our Security Researcher Cameron Camp provide us highlights from the DEF CON 30 conference. Scattered...

Azure Developers Targeted By Malicious NPM Packages

RubyGems Requires MFA for Popular Projects

August 17, 2022
0

RubyGems, the popular community site for hosting Ruby projects, is now requiring the maintainers of the most popular projects to...

Load More
  • Trending
  • Comments
  • Latest
Brave browser’s Tor mode exposed users’ dark web activity

Brave browser’s Tor mode exposed users’ dark web activity

February 18, 2022
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 18/08

August 18, 2022
Spring Framework Flaw Exploited in Mirai Malware Attacks

CISA Warns of Ongoing Exploitation Against Zimbra Flaws

August 18, 2022
High-Severity Flaw in Argo CD is Information Leak Risk

Apple Patches New macOS, iOS Zero-Days

August 18, 2022
How Can Crypto and CBDCs Help Communities?

How Can Crypto and CBDCs Help Communities?

August 18, 2022

Recent Posts

This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 18/08

August 18, 2022
Spring Framework Flaw Exploited in Mirai Malware Attacks

CISA Warns of Ongoing Exploitation Against Zimbra Flaws

August 18, 2022
High-Severity Flaw in Argo CD is Information Leak Risk

Apple Patches New macOS, iOS Zero-Days

August 18, 2022

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • Malware
  • Networking
  • Protection

Tags

Access Android attack Attacks banking BiWeekly breach bug Cisco critical Cyber Cybersecurity Data devices Digital financial Finds Fintech Flaw flaws Google Group Hackers Krebs Latest malware Microsoft million Network News open patches Payments phishing platform Ransomware RoundUp security Software TFT Threat vulnerability warns Week Windows

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved