FIN4 is a financially-motivated threat group that has targeted confidential information related to the public financial market, particularly regarding healthcare and pharmaceutical companies, since at least 2013.[1][2] FIN4 is unique in that they do not infect victims with typical persistent malware, but rather they focus on capturing credentials authorized to access email and other non-public correspondence.[1][3]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1090 | .003 | 代理: Multi-hop Proxy | |
| Enterprise | T1059 | .005 | 命令与脚本解释器: Visual Basic |
FIN4 has used VBA macros to display a dialog box and collect victim credentials.[1][3] |
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols | |
| Enterprise | T1078 | 有效账户 |
FIN4 has used legitimate credentials to hijack email communications.[1][3] |
|
| Enterprise | T1204 | .001 | 用户执行: Malicious Link |
FIN4 has lured victims to click malicious links delivered via spearphishing emails (often sent from compromised accounts).[1][3] |
| .002 | 用户执行: Malicious File |
FIN4 has lured victims to launch malicious attachments delivered via spearphishing emails (often sent from compromised accounts).[1][3] |
||
| Enterprise | T1114 | .002 | 电子邮件收集: Remote Email Collection |
FIN4 has accessed and hijacked online email communications using stolen credentials.[1][3] |
| Enterprise | T1056 | .001 | 输入捕获: Keylogging |
FIN4 has captured credentials via fake Outlook Web App (OWA) login pages and has also used a .NET based keylogger.[1][3] |
| .002 | 输入捕获: GUI Input Capture |
FIN4 has presented victims with spoofed Windows Authentication prompts to collect their credentials.[1][3] |
||
| Enterprise | T1566 | .001 | 钓鱼: Spearphishing Attachment |
FIN4 has used spearphishing emails containing attachments (which are often stolen, legitimate documents sent from compromised accounts) with embedded malicious macros.[1][3] |
| .002 | 钓鱼: Spearphishing Link |
FIN4 has used spearphishing emails (often sent from compromised accounts) containing malicious links.[1][3] |
||
| Enterprise | T1564 | .008 | 隐藏伪装: Email Hiding Rules |
FIN4 has created rules in victims' Microsoft Outlook accounts to automatically delete emails containing words such as "hacked," "phish," and "malware" in a likely attempt to prevent organizations from communicating about their activities.[1] |