"FIN7 Cybercrime Syndicate Emerges as a Major Player in Ransomware Landscape"

A comprehensive investigation of FIN7 has uncovered the cybercrime syndicate's organizational structure, as well as its position as an affiliate in the escalating ransomware attacks. It has also revealed deeper ties between the group and the greater threat ecosystem, which includes the now-defunct DarkSide, REvil, and LockBit ransomware families. The highly active threat group, also known as Carbanak, is notorious for employing an arsenal of tools and techniques to broaden its cybercrime operations, including the addition of ransomware to its playbook and the creation of fake security firms to lure researchers into conducting ransomware attacks under the guise of penetration testing. The financially motivated opponent has compromised over 8,147 victims across the globe, the most of which are located in the US. Other notable nations include China, Germany, Canada, Italy, and the UK. Over the years, FIN7's intrusion techniques have expanded beyond classic social engineering to include infected USB drives, software supply chain breaches, and the buying of stolen credentials on underground marketplaces. The Russian-speaking hacking group has also been detected exploiting Microsoft Exchange vulnerabilities such as CVE-2020-0688, CVE-2021-42324, ProxyLogon, and ProxyShell to get access to target environments. Despite the use of double extortion tactics, the gang has implemented SSH backdoors on compromised systems, even in situations where the victim has already paid the ransom. The plan is to resell access to other ransomware organizations and re-target victims as part of its illegal money-making scheme, highlighting its attempts to minimize efforts and maximize profits, as well as prioritize companies based on their annual revenues, dates of establishment, and number of employees. This article continues to discuss the growth of the FIN7 cybercrime syndicate. 

THN reports "FIN7 Cybercrime Syndicate Emerges as a Major Player in Ransomware Landscape"

Submitted by Anonymous on