
The Clop ransomware has become a tool of choice for the financially motivated group.
The FIN11 financial crime gang is shifting its tactics from phishing and credential-theft to ransomware, researchers said.
According to FireEye Mandiant researchers, FIN11 is notable for its āsheer volume of activity,ā known to run up to five disparate wide-scale email phishing campaigns per week. āAt this point, it would be difficult to name a client that FIN11 hasnāt targeted,ā Mandiant researchers noted, in a posting on Tuesday.
But lately, it has used the Clop ransomware to up its monetary gains.
Researchers have recently observed attacks in which FIN11 threatened to publish exfiltrated data to pressure victims into paying ransom demands, in a tactic known as double extortion. Clop (which emerged in February 2019) is often used in these kinds of attacks, putting it in the company of the Maze, DoppelPaymerĀ andĀ SodinokibiĀ ransomware families.
Clop recently made headlines as the malware behind double-extortion attacks on Germanyās Software AG (which carried a $23 million ransom) and a biopharmaceutical firm called ExecuPharm.
FIN11 has been around for at least four years, conducting widespread phishing campaigns. However, it continues to evolve ā itās use of Clop and double extortion is only the latest change in its tactics and tools. It added point-of-sale (POS) malware to its arsenal in 2018, according to Mandiant; and started conducting run-of-the-mill ransomware attacks in 2019.
Itās changed its victimology, too, researchers said: āFrom 2017 through 2018, the threat group primarily targeted organizations in the financial, retail, and hospitality sectors. However, in 2019 FIN11ās targeting expanded to include a diverse set of sectors and geographic regions.ā
Mandiantās analysis noted that the changes may have been implemented to supplement the ongoing phishing efforts because the latter arenāt wildly successful.
āWeāve only observed the group successfully monetize access in few instances,ā researchers said. āThis could suggest that the actors cast a wide net during their phishing operations, then choose which victims to further exploit based on characteristics such as sector, geolocation or perceived security posture.ā
Also, FIN11 is a subset of the larger TA505 group (a.k.a. Hive0065), which is a financially motivated cybercrime group that has been actively targeting various industries, including finance, retail and restaurants, since at least 2014. Itās known for using a wide range of tactics (in March, IBM X-Force observed TA505 using COVID-19 themed phishing emails) ā plus ongoing malware authoring and development.
Its wares includeĀ fully-fledged backdoors and RATsĀ ā including the recently spotted SDBbot code. And in January, a new backdoor named ServHelperĀ was spotted in the wild, acting as both a remote desktop agent as well as a downloader for a RAT called FlawedGrace.
These campaigns deliver a variety of payloads, including theĀ DridexĀ andĀ TrickBot trojans, and, yes, ransomware. The latter includes Clop, but also LockyĀ andĀ MINEBRIDGE.
All of this could also explain FIN11ās adoption of new malware.
āLike most financially motivated actors, FIN11 doesnāt operate in a vacuum,ā Mandiant researchers concluded. āWe believe that the group has used services that provide anonymous domain registration, bulletproof hosting, code signing certificates, and private or semi-private malware. Outsourcing work to these criminal service providers likely enables FIN11 to increase the scale and sophistication of their operations.ā
Brandon Hoffman, CISO at Netenrich, told Threatpost that this use of service providers in the underground iis common. āThere is a whole marketplace of providers that cater to and operate in what some refer to as the dark web. These services are not limited to the ones described as in use by FIN11 but include code-writing services, monetary exchanges and more,ā he said.
Hoffman also pointed out that this evolution to ransomware and extortion has become common for cybercriminals everywhere.
āBroad-based phishing campaigns with the hope of hooking ransomware into an organization for the purpose of extortion, while leveraging malicious service providers, is at the basic footprint of cybercrime today,ā he said. āWhat makes this group special or different remains to be seen for those of us on the outside.ā
On October 14 at 2 PM ETĀ Get the latest information on the rising threats to retail e-commerce security and how to stop them.Ā Register todayĀ for this FREE Threatpost webinar, āRetail Security: Magecart and the Rise of e-Commerce Threats.ā Find out how websites can avoid becoming the next compromise as we go into the holiday season. Join us Wednesday, Oct. 14, 2-3 PM ET for thisĀ LIVEĀ webinar.