Carding Forum
Professional
- Messages
- 2,788
- Reaction score
- 1,177
- Points
- 113
Silent Push experts claim that the FIN7 group resumed its activities after the United States announced the liquidation of the group in 2021.
In 2021, the United States announced that FIN7 no longer exists, after sentences were handed down to key members of the group. The US Department of Justice described FIN7 as a criminal organization with more than 70 participants organized into separate business units and teams. The FIN7 Group has caused approximately $ 3 billion in damage to organizations since 2013.
Recall that in 2023, hacker attacks continued, but not as part of FIN7, but under other brands. FIN7 is associated with the Black Basta, DarkSide, REvil, and LockBit ransomware families.
According to Silent Push, in 2024 FIN7 returned to active activity on its own behalf, creating thousands of sites that mimic various media and technology companies. Malicious domains are registered by a major hosting provider, Stark Industries Solutions.
The first signs of FIN7's resurgence came in April 2024, when Blackberry reported a major car company being hacked. The attack started by infecting users who were searching for a popular free network scanning tool.
Silent Push specialists have developed a method for tracking the fast-growing FIN7 infrastructure, which includes more than 4,000 hosts. Hackers use various methods: from typesquatting tactics and infected advertising (malvertising) to malicious browser extensions and phishing domains.
FIN7 domains target various major brands, including American Express, Bitwarden, Bloomberg, CNN, Dropbox, Google, Meta, Microsoft 365, Midjourney, and others. Many domains look like ordinary websites for various businesses, often with texts from standard templates. This is done to artificially "age" domains and give them a positive reputation. It took hackers 6-9 months to roll out the infrastructure.
In attacks using the typesquatting method, cybercriminals register domains similar to those of popular software. Phishing domains are advertised on Google so that links to them are displayed in search results higher than real software sources. Software that is used as bait includes 7-zip, PuTTY, ProtectedPDFViewer, AIMP, Notepad++, Advanced IP Scanner, AnyDesk, pgAdmin, AutoDesk, Bitwarden, Rest Proxy, Python, Sublime Text, and Node.js.
Silent Push discovered the new FIN7 domains after being contacted by a company that had been attacked by the group in the past and suspected that the group was active again. A search for hosts revealed only one active site, which then led to many other FIN7 resources.
Previously, FIN7 operated through fake information security companies that recruited hackers to help in ransomware attacks. So one of the key members of the group was arrested, who responded to the company's vacancy.
Like other phishing groups, FIN7 uses current global events. Hackers are now targeting tourists visiting the Olympic Games in France. Among the new FIN7 domains, there are several phishing sites that sell fake Louvre tickets.
According to Silent Push, the research clearly shows that FIN7 is back and expanding rapidly. The company expressed the hope that law enforcement agencies will pay attention to this and take additional measures, and that many of the competitors will be able to use the disclosed information to expand research on the FIN7 infrastructure.
• Source: https://www.silentpush.com/blog/fin7/
In 2021, the United States announced that FIN7 no longer exists, after sentences were handed down to key members of the group. The US Department of Justice described FIN7 as a criminal organization with more than 70 participants organized into separate business units and teams. The FIN7 Group has caused approximately $ 3 billion in damage to organizations since 2013.
Recall that in 2023, hacker attacks continued, but not as part of FIN7, but under other brands. FIN7 is associated with the Black Basta, DarkSide, REvil, and LockBit ransomware families.
According to Silent Push, in 2024 FIN7 returned to active activity on its own behalf, creating thousands of sites that mimic various media and technology companies. Malicious domains are registered by a major hosting provider, Stark Industries Solutions.
The first signs of FIN7's resurgence came in April 2024, when Blackberry reported a major car company being hacked. The attack started by infecting users who were searching for a popular free network scanning tool.
Silent Push specialists have developed a method for tracking the fast-growing FIN7 infrastructure, which includes more than 4,000 hosts. Hackers use various methods: from typesquatting tactics and infected advertising (malvertising) to malicious browser extensions and phishing domains.
FIN7 domains target various major brands, including American Express, Bitwarden, Bloomberg, CNN, Dropbox, Google, Meta, Microsoft 365, Midjourney, and others. Many domains look like ordinary websites for various businesses, often with texts from standard templates. This is done to artificially "age" domains and give them a positive reputation. It took hackers 6-9 months to roll out the infrastructure.
In attacks using the typesquatting method, cybercriminals register domains similar to those of popular software. Phishing domains are advertised on Google so that links to them are displayed in search results higher than real software sources. Software that is used as bait includes 7-zip, PuTTY, ProtectedPDFViewer, AIMP, Notepad++, Advanced IP Scanner, AnyDesk, pgAdmin, AutoDesk, Bitwarden, Rest Proxy, Python, Sublime Text, and Node.js.
Silent Push discovered the new FIN7 domains after being contacted by a company that had been attacked by the group in the past and suspected that the group was active again. A search for hosts revealed only one active site, which then led to many other FIN7 resources.
Previously, FIN7 operated through fake information security companies that recruited hackers to help in ransomware attacks. So one of the key members of the group was arrested, who responded to the company's vacancy.
Like other phishing groups, FIN7 uses current global events. Hackers are now targeting tourists visiting the Olympic Games in France. Among the new FIN7 domains, there are several phishing sites that sell fake Louvre tickets.
According to Silent Push, the research clearly shows that FIN7 is back and expanding rapidly. The company expressed the hope that law enforcement agencies will pay attention to this and take additional measures, and that many of the competitors will be able to use the disclosed information to expand research on the FIN7 infrastructure.
• Source: https://www.silentpush.com/blog/fin7/