FIN8 is a financially motivated threat group that has been active since at least January 2016, and known for targeting organizations in the hospitality, retail, entertainment, insurance, technology, chemical, and financial sectors. In June 2021, security researchers detected FIN8 switching from targeting point-of-sale (POS) devices to distributing a number of ransomware variants.[1][2][3][4]
| Name | Description |
|---|---|
| Syssphinx |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1047 | Windows管理规范 |
FIN8's malicious spearphishing payloads use WMI to launch malware and spawn |
|
| Enterprise | T1546 | .003 | 事件触发执行: Windows Management Instrumentation Event Subscription | |
| Enterprise | T1112 | 修改注册表 |
FIN8 has deleted Registry keys during post compromise cleanup activities.[6] |
|
| Enterprise | T1573 | .002 | 加密通道: Asymmetric Cryptography |
FIN8 has used the Plink utility to tunnel RDP back to C2 infrastructure.[6] |
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
FIN8's malicious spearphishing payloads are executed as PowerShell. FIN8 has also used PowerShell for lateral movement and credential access.[1][5][6][4] |
| .003 | 命令与脚本解释器: Windows Command Shell |
FIN8 has used a Batch file to automate frequently executed post compromise cleanup activities.[6] FIN8 has also executed commands remotely via |
||
| Enterprise | T1482 | 域信任发现 |
FIN8 has retrieved a list of trusted domains by using |
|
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols | |
| Enterprise | T1560 | .001 | 归档收集数据: Archive via Utility |
FIN8 has used RAR to compress collected data before exfiltration.[6] |
| Enterprise | T1003 | .001 | 操作系统凭证转储: LSASS Memory |
FIN8 harvests credentials using Invoke-Mimikatz or Windows Credentials Editor (WCE).[6] |
| Enterprise | T1074 | .002 | 数据分段: Remote Data Staging |
FIN8 aggregates staged data from a network into a single location.[6] |
| Enterprise | T1486 | 数据加密以实现影响 |
FIN8 has deployed ransomware such as Ragnar Locker, White Rabbit, and attempted to execute Noberus on compromised networks.[4] |
|
| Enterprise | T1048 | .003 | 替代协议渗出: Exfiltration Over Unencrypted Non-C2 Protocol | |
| Enterprise | T1078 | 有效账户 |
FIN8 has used valid accounts for persistence and lateral movement.[6] |
|
| Enterprise | T1068 | 权限提升漏洞利用 |
FIN8 has exploited the CVE-2016-0167 local vulnerability.[2][6] |
|
| Enterprise | T1027 | .010 | 混淆文件或信息: Command Obfuscation |
FIN8 has used environment variables and standard input (stdin) to obfuscate command-line arguments. FIN8 also obfuscates malicious macros delivered as payloads.[1][6][5] |
| Enterprise | T1204 | .001 | 用户执行: Malicious Link |
FIN8 has used emails with malicious links to lure victims into installing malware.[1][2][6] |
| .002 | 用户执行: Malicious File |
FIN8 has used malicious e-mail attachments to lure victims into executing malware.[1][2][6] |
||
| Enterprise | T1070 | .001 | 移除指标: Clear Windows Event Logs |
FIN8 has cleared logs during post compromise cleanup activities.[6] |
| .004 | 移除指标: File Deletion |
FIN8 has deleted tmp and prefetch files during post compromise cleanup activities. FIN8 has also deleted PowerShell scripts to evade detection on compromised machines.[6][4] |
||
| Enterprise | T1082 | 系统信息发现 |
FIN8 has used PowerShell Scripts to check the architecture of a compromised machine before the selection of a 32-bit or 64-bit version of a malicious .NET loader.[4] |
|
| Enterprise | T1033 | 系统所有者/用户发现 |
FIN8 has executed the command |
|
| Enterprise | T1016 | .001 | 系统网络配置发现: Internet Connection Discovery |
FIN8 has used the Ping command to check connectivity to actor-controlled C2 servers.[3] |
| Enterprise | T1102 | 网络服务 |
FIN8 has used |
|
| Enterprise | T1588 | .002 | 获取能力: Tool |
FIN8 has used open-source tools such as Impacket for targeting efforts.[3] |
| .003 | 获取能力: Code Signing Certificates |
FIN8 has used an expired open-source X.509 certificate for testing in the OpenSSL repository, to connect to actor-controlled C2 servers.[3] |
||
| Enterprise | T1134 | .001 | 访问令牌操控: Token Impersonation/Theft |
FIN8 has used a malicious framework designed to impersonate the lsass.exe/vmtoolsd.exe token.[5][4] |
| Enterprise | T1518 | .001 | 软件发现: Security Software Discovery |
FIN8 has used Registry keys to detect and avoid executing in potential sandboxes.[6] |
| Enterprise | T1105 | 输入工具传输 |
FIN8 has used remote code execution to download subsequent payloads.[2][5] |
|
| Enterprise | T1055 | .004 | 进程注入: Asynchronous Procedure Call |
FIN8 has injected malicious code into a new svchost.exe process.[5] |
| Enterprise | T1021 | .001 | 远程服务: Remote Desktop Protocol | |
| .002 | 远程服务: SMB/Windows Admin Shares |
FIN8 has attempted to map to C$ on enumerated hosts to test the scope of their current credentials/context. FIN8 has also used smbexec from the Impacket suite for lateral movement.[6][3] |
||
| Enterprise | T1018 | 远程系统发现 |
FIN8 has used dsquery and other Active Directory utilities to enumerate hosts; they have also used |
|
| Enterprise | T1566 | .001 | 钓鱼: Spearphishing Attachment |
FIN8 has distributed targeted emails containing Word documents with embedded malicious macros.[1][2][6] |
| .002 | 钓鱼: Spearphishing Link |
FIN8 has distributed targeted emails containing links to malicious documents with embedded macros.[6] |
||
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task | |