FIN7 Targets American Automaker's IT Staff In Phishing Attacks
Researchers at BlackBerry have disclosed details of a spear-phishing campaign identified in late 2023 that targeted a large automotive manufacturer based in the United States. The campaign has been attributed to a financially motived threat actor called FIN7 and initiated with spear-phishing emails targeting highly privileged employees in the IT department of the unnamed U.S. based manufacturer. These emails contained links to a malicious URL (advanced-ip-sccanner[.]com) masquerading as the legitimate website for Advanced IP scanner, a free online scanner. In this case, the fake site would redirect the victims to another domain called myipscanner[.]com (currently offline), which in turn would further redirect to an attacker-owned Dropbox to initiate the download of a malicious executable called WsTaskLoad[.]exe on the targeted system. Once executed, researchers note that this file will initiate a multi-stage infection chain involving DLL, WAV files, and shellcode execution to run the final payload, which in this case is a backdoor called Anunak/Carbanak.
Security Officer Comments:
FIN7 has been active since 2013 and is known for targeting several sectors including Casinos and Gambling, Construction, Education, Energy, Financial, Government, High-Tech, Hospitality, Retail, Food and Ag, Technology, Telecommunications, Transportation, etc. Last year, the group was observed targeting exposed Veeam backup and Microsoft Exchange servers and deploying ransomware payloads like Black Basta and Clop onto corporate networks. In the latest campaign, BlackBerry notes that early identification of the initial infection and subsequent actions by the threat actor allowed analysts to quickly locate and remove the infected system from the network prior to lateral movement, preventing the actors from installing ransomware and causing further damage.
Suggested Corrections:
In the last couple of years, there has been a trend in FIN7 going after large institutions and organizations. While this definitely takes up a lot of the actors’ time and resources, the potential for bigger ransom payouts from these organizations makes up for this. Given that FIN7 relies on phishing as its initial infection vector, BlackBerry recommends organizations to take the following steps to stay defended:
FIN7 IOCs:
https://blogs.blackberry.com/en/2024/04/fin7-targets-the-united-states-automotive-industry
Link(s):
https://www.bleepingcomputer.com/ne...ican-automakers-it-staff-in-phishing-attacks/