Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Groups
  3. FIN6

FIN6

FIN6 is a cyber crime group that has stolen payment card data and sold it for profit on underground marketplaces. This group has aggressively targeted and compromised point of sale (PoS) systems in the hospitality and retail sectors.[1][2]

ID: G0037
Associated Groups: Magecart Group 6, ITG08, Skeleton Spider, TAAL, Camouflage Tempest
Contributors: Center for Threat-Informed Defense (CTID); Drew Church, Splunk
Version: 4.0
Created: 31 May 2017
Last Modified: 17 November 2024

Associated Group Descriptions

NameDescription
Magecart Group 6

[3]

ITG08

[4]

Skeleton Spider

[5]

TAAL

[6]

Camouflage Tempest

[6]

Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1134Access Token Manipulation

FIN6 has used has used Metasploit’s named-pipe impersonation technique to escalate privileges.[2]

EnterpriseT1087.002Account Discovery:Domain Account

FIN6 has used Metasploit’sPsExec NTDSGRAB module to obtain a copy of the victim's Active Directory database.[1]

EnterpriseT1560Archive Collected Data

Following data collection,FIN6 has compressed log files into a ZIP archive prior to staging and exfiltration.[1]

.003Archive via Custom Method

FIN6 has encoded data gathered from the victim with a simple substitution cipher and single-byte XOR using the 0xAA key, and Base64 with character permutation.[1][7]

EnterpriseT1119Automated Collection

FIN6 has used a script to iterate through a list of compromised PoS systems, copy and remove data to a log file, and to bind to events from the submit payment button.[1][7]

EnterpriseT1547.001Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder

FIN6 has used Registry Run keys to establish persistence for its downloader tools known as HARDTACK and SHIPBREAD.[1]

EnterpriseT1110.002Brute Force:Password Cracking

FIN6 has extracted password hashes from ntds.dit to crack offline.[1]

EnterpriseT1059Command and Scripting Interpreter

FIN6 has used scripting to iterate through a list of compromised PoS systems, copy data to a log file, and remove the original data files.[1][2]

.001PowerShell

FIN6 has used PowerShell to gain access to merchant's networks, and a Metasploit PowerShell module to download and execute shellcode and to set up a local listener.[1][2][8]

.003Windows Command Shell

FIN6 has usedkill.bat script to disable security tools.[2]

.007JavaScript

FIN6 has used malicious JavaScript to steal payment card data from e-commerce sites.[7]

EnterpriseT1555Credentials from Password Stores

FIN6 has used the Stealer One credential stealer to target e-mail and file transfer utilities including FTP.[8]

.003Credentials from Web Browsers

FIN6 has used the Stealer One credential stealer to target web browsers.[8]

EnterpriseT1213.006Data from Information Repositories:Databases

FIN6 has collected schemas and user accounts from systems running SQL Server.[8]

EnterpriseT1005Data from Local System

FIN6 has collected and exfiltrated payment card data from compromised systems.[7][9][10]

EnterpriseT1074.002Data Staged:Remote Data Staging

FIN6 actors have compressed data from remote systems and moved it to another staging system before exfiltration.[1]

EnterpriseT1573.002Encrypted Channel:Asymmetric Cryptography

FIN6 used the Plink command-line utility to create SSH tunnels to C2 servers.[1]

EnterpriseT1048.003Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol

FIN6 has sent stolen payment card data to remote servers via HTTP POSTs.[7]

EnterpriseT1068Exploitation for Privilege Escalation

FIN6 has used tools to exploit Windows vulnerabilities in order to escalate privileges. The tools targeted CVE-2013-3660, CVE-2011-2005, and CVE-2010-4398, all of which could allow local users to access kernel-level privileges.[1]

EnterpriseT1562.001Impair Defenses:Disable or Modify Tools

FIN6 has deployed a utility script namedkill.bat to disable anti-virus.[2]

EnterpriseT1070.004Indicator Removal:File Deletion

FIN6 has removed files from victim machines.[1]

EnterpriseT1036.004Masquerading:Masquerade Task or Service

FIN6 has renamed the "psexec" service name to "mstdc" to masquerade as a legitimate Windows service.[2]

EnterpriseT1046Network Service Discovery

FIN6 used publicly available tools (including Microsoft's built-in SQL querying tool, osql.exe) to map the internal network and conduct reconnaissance against Active Directory, Structured Query Language (SQL) servers, and NetBIOS.[1]

EnterpriseT1095Non-Application Layer Protocol

FIN6 has used Metasploit Bind and Reverse TCP stagers.[7]

EnterpriseT1027.010Obfuscated Files or Information:Command Obfuscation

FIN6 has used encoded PowerShell commands.[8]

EnterpriseT1588.002Obtain Capabilities:Tool

FIN6 has obtained and used tools such asMimikatz,Cobalt Strike, andAdFind.[4][2]

EnterpriseT1003.001OS Credential Dumping:LSASS Memory

FIN6 has usedWindows Credential Editor for credential dumping.[1][2]

.003OS Credential Dumping:NTDS

FIN6 has used Metasploit’sPsExec NTDSGRAB module to obtain a copy of the victim's Active Directory database.[1][2]

EnterpriseT1566.001Phishing:Spearphishing Attachment

FIN6 has targeted victims with e-mails containing malicious attachments.[8]

.003Phishing:Spearphishing via Service

FIN6 has used fake job advertisements sent via LinkedIn to spearphish targets.[4]

EnterpriseT1572Protocol Tunneling

FIN6 used the Plink command-line utility to create SSH tunnels to C2 servers.[1]

EnterpriseT1021.001Remote Services:Remote Desktop Protocol

FIN6 used RDP to move laterally in victim networks.[1][2]

EnterpriseT1018Remote System Discovery

FIN6 used publicly available tools (including Microsoft's built-in SQL querying tool, osql.exe) to map the internal network and conduct reconnaissance against Active Directory, Structured Query Language (SQL) servers, and NetBIOS.[1]

EnterpriseT1053.005Scheduled Task/Job:Scheduled Task

FIN6 has used scheduled tasks to establish persistence for various malware it uses, including downloaders known as HARDTACK and SHIPBREAD andFrameworkPOS.[1]

EnterpriseT1553.002Subvert Trust Controls:Code Signing

FIN6 has used Comodo code-signing certificates.[4]

EnterpriseT1569.002System Services:Service Execution

FIN6 has created Windows services to execute encoded PowerShell commands.[2]

EnterpriseT1204.002User Execution:Malicious File

FIN6 has used malicious documents to lure victims into allowing execution of PowerShell scripts.[8]

EnterpriseT1078Valid Accounts

To move laterally on a victim network,FIN6 has used credentials stolen from various systems on which it gathered usernames and password hashes.[1][2][8]

EnterpriseT1102Web Service

FIN6 has used Pastebin and Google Storage to host content for their operations.[2]

EnterpriseT1047Windows Management Instrumentation

FIN6 has used WMI to automate the remote execution of PowerShell scripts.[4]

Software

IDNameReferencesTechniques
S0552AdFind[2]Account Discovery:Domain Account,Domain Trust Discovery,Permission Groups Discovery:Domain Groups,Remote System Discovery,System Network Configuration Discovery
S0154Cobalt Strike[2]Abuse Elevation Control Mechanism:Sudo and Sudo Caching,Abuse Elevation Control Mechanism:Bypass User Account Control,Access Token Manipulation:Parent PID Spoofing,Access Token Manipulation:Token Impersonation/Theft,Access Token Manipulation:Make and Impersonate Token,Account Discovery:Domain Account,Application Layer Protocol:DNS,Application Layer Protocol:Web Protocols,Application Layer Protocol:File Transfer Protocols,BITS Jobs,Browser Session Hijacking,Command and Scripting Interpreter:JavaScript,Command and Scripting Interpreter:Visual Basic,Command and Scripting Interpreter:PowerShell,Command and Scripting Interpreter:Python,Command and Scripting Interpreter:Windows Command Shell,Create or Modify System Process:Windows Service,Data Encoding:Standard Encoding,Data from Local System,Data Obfuscation:Protocol or Service Impersonation,Data Transfer Size Limits,Deobfuscate/Decode Files or Information,Encrypted Channel:Asymmetric Cryptography,Encrypted Channel:Symmetric Cryptography,Exploitation for Client Execution,Exploitation for Privilege Escalation,File and Directory Discovery,Hide Artifacts:Process Argument Spoofing,Impair Defenses:Disable or Modify Tools,Indicator Removal:Timestomp,Ingress Tool Transfer,Input Capture:Keylogging,Modify Registry,Native API,Network Service Discovery,Network Share Discovery,Non-Application Layer Protocol,Obfuscated Files or Information:Indicator Removal from Tools,Obfuscated Files or Information,Office Application Startup:Office Template Macros,OS Credential Dumping:LSASS Memory,OS Credential Dumping:Security Account Manager,Permission Groups Discovery:Domain Groups,Permission Groups Discovery:Local Groups,Process Discovery,Process Injection:Dynamic-link Library Injection,Process Injection:Process Hollowing,Process Injection,Protocol Tunneling,Proxy:Domain Fronting,Proxy:Internal Proxy,Query Registry,Reflective Code Loading,Remote Services:Remote Desktop Protocol,Remote Services:SSH,Remote Services:Windows Remote Management,Remote Services:SMB/Windows Admin Shares,Remote Services:Distributed Component Object Model,Remote System Discovery,Scheduled Transfer,Screen Capture,Software Discovery,Subvert Trust Controls:Code Signing,System Binary Proxy Execution:Rundll32,System Network Configuration Discovery,System Network Connections Discovery,System Service Discovery,System Services:Service Execution,Use Alternate Authentication Material:Pass the Hash,Valid Accounts:Domain Accounts,Valid Accounts:Local Accounts,Windows Management Instrumentation
S0381FlawedAmmyy[8]Application Layer Protocol:Web Protocols,Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder,Clipboard Data,Command and Scripting Interpreter:Windows Command Shell,Command and Scripting Interpreter:PowerShell,Data from Local System,Data Obfuscation,Encrypted Channel:Symmetric Cryptography,Exfiltration Over C2 Channel,Indicator Removal:File Deletion,Ingress Tool Transfer,Input Capture:Keylogging,Input Capture,Peripheral Device Discovery,Permission Groups Discovery:Local Groups,Screen Capture,Software Discovery:Security Software Discovery,System Binary Proxy Execution:Rundll32,System Binary Proxy Execution:Msiexec,System Information Discovery,System Owner/User Discovery,Windows Management Instrumentation
S0503FrameworkPOS[11][5][8]Archive Collected Data:Archive via Custom Method,Data from Local System,Data Staged:Local Data Staging,Exfiltration Over Alternative Protocol,Process Discovery
S0632GrimAgent[12]Application Layer Protocol:Web Protocols,Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder,Command and Scripting Interpreter:Windows Command Shell,Data Encoding:Standard Encoding,Data from Local System,Data Obfuscation:Junk Data,Deobfuscate/Decode Files or Information,Encrypted Channel:Asymmetric Cryptography,Encrypted Channel:Symmetric Cryptography,Execution Guardrails:Mutual Exclusion,Exfiltration Over C2 Channel,File and Directory Discovery,Indicator Removal:Clear Persistence,Indicator Removal:File Deletion,Ingress Tool Transfer,Native API,Obfuscated Files or Information,Obfuscated Files or Information:Binary Padding,Scheduled Task/Job:Scheduled Task,System Information Discovery,System Location Discovery:System Language Discovery,System Location Discovery,System Network Configuration Discovery,System Owner/User Discovery,Virtualization/Sandbox Evasion:Time Based Checks
S0372LockerGoga[2]Account Access Removal,Data Encrypted for Impact,Impair Defenses:Disable or Modify Tools,Indicator Removal:File Deletion,Lateral Tool Transfer,Loss of Control,Loss of Productivity and Revenue,Loss of View,Subvert Trust Controls:Code Signing,System Shutdown/Reboot
S0449Maze[13]Application Layer Protocol:Web Protocols,Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder,Command and Scripting Interpreter:Windows Command Shell,Data Encrypted for Impact,Dynamic Resolution,Hide Artifacts:Run Virtual Instance,Impair Defenses:Disable or Modify Tools,Indicator Removal,Inhibit System Recovery,Masquerading:Masquerade Task or Service,Native API,Obfuscated Files or Information:Junk Code Insertion,Obfuscated Files or Information,Process Discovery,Process Injection:Dynamic-link Library Injection,Scheduled Task/Job:Scheduled Task,Service Stop,System Binary Proxy Execution:Msiexec,System Information Discovery,System Location Discovery:System Language Discovery,System Network Connections Discovery,System Shutdown/Reboot,Windows Management Instrumentation
S0002Mimikatz[4]Access Token Manipulation:SID-History Injection,Account Manipulation,Boot or Logon Autostart Execution:Security Support Provider,Credentials from Password Stores,Credentials from Password Stores:Credentials from Web Browsers,Credentials from Password Stores:Windows Credential Manager,OS Credential Dumping:DCSync,OS Credential Dumping:Security Account Manager,OS Credential Dumping:LSASS Memory,OS Credential Dumping:LSA Secrets,Rogue Domain Controller,Steal or Forge Authentication Certificates,Steal or Forge Kerberos Tickets:Golden Ticket,Steal or Forge Kerberos Tickets:Silver Ticket,Unsecured Credentials:Private Keys,Use Alternate Authentication Material:Pass the Hash,Use Alternate Authentication Material:Pass the Ticket
S0284More_eggs[4][8]Application Layer Protocol:Web Protocols,Command and Scripting Interpreter:Windows Command Shell,Data Encoding:Standard Encoding,Deobfuscate/Decode Files or Information,Encrypted Channel:Symmetric Cryptography,Indicator Removal:File Deletion,Ingress Tool Transfer,Obfuscated Files or Information:Encrypted/Encoded File,Software Discovery:Security Software Discovery,Subvert Trust Controls:Code Signing,System Binary Proxy Execution:Regsvr32,System Information Discovery,System Network Configuration Discovery:Internet Connection Discovery,System Network Configuration Discovery,System Owner/User Discovery
S0029PsExec[1][2]Create Account:Domain Account,Create or Modify System Process:Windows Service,Lateral Tool Transfer,Remote Services:SMB/Windows Admin Shares,System Services:Service Execution
S0446Ryuk[2]Access Token Manipulation,Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder,Command and Scripting Interpreter:Windows Command Shell,Data Encrypted for Impact,File and Directory Discovery,File and Directory Permissions Modification:Windows File and Directory Permissions Modification,Impair Defenses:Disable or Modify Tools,Inhibit System Recovery,Local Storage Discovery,Loss of Productivity and Revenue,Masquerading:Match Legitimate Resource Name or Location,Masquerading,Native API,Obfuscated Files or Information,Process Discovery,Process Injection,Remote Services:SMB/Windows Admin Shares,Scheduled Task/Job:Scheduled Task,Service Stop,System Location Discovery:System Language Discovery,System Network Configuration Discovery,Traffic Signaling,Valid Accounts:Domain Accounts
S0005Windows Credential Editor[1]OS Credential Dumping:LSASS Memory

References

  1. FireEye Threat Intelligence. (2016, April). Follow the Money: Dissecting the Operations of the Cyber Crime Group FIN6. Retrieved November 17, 2024.
  2. McKeague, B. et al. (2019, April 5). Pick-Six: Intercepting a FIN6 Intrusion, an Actor Recently Tied to Ryuk and LockerGoga Ransomware. Retrieved April 17, 2019.
  3. Villadsen, O. (2020, April 7). ITG08 (aka FIN6) Partners With TrickBot Gang, Uses Anchor Framework. Retrieved October 8, 2020.
  4. Villadsen, O.. (2019, August 29). More_eggs, Anyone? Threat Actor ITG08 Strikes Again. Retrieved September 16, 2019.
  5. CrowdStrike. (2018, February 26). CrowdStrike 2018 Global Threat Report. Retrieved October 10, 2018.
  6. Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.
  7. Chen, J. (2019, October 10). Magecart Card Skimmers Injected Into Online Shops. Retrieved September 9, 2020.
  1. Visa Public. (2019, February). FIN6 Cybercrime Group Expands Threat to eCommerce Merchants. Retrieved September 16, 2019.
  2. Klijnsma, Y. (2018, September 11). Inside the Magecart Breach of British Airways: How 22 Lines of Code Claimed 380,000 Victims. Retrieved September 9, 2020.
  3. Klijnsma, Y. (2018, September 19). Another Victim of the Magecart Assault Emerges: Newegg. Retrieved September 9, 2020.
  4. Kremez, V. (2019, September 19). FIN6 “FrameworkPOS”: Point-of-Sale Malware Analysis & Internals. Retrieved September 8, 2020.
  5. Priego, A. (2021, July). THE BROTHERS GRIM: THE REVERSING TALE OF GRIMAGENT MALWARE USED BY RYUK. Retrieved September 19, 2024.
  6. Kennelly, J., Goody, K., Shilko, J. (2020, May 7). Navigating the MAZE: Tactics, Techniques and Procedures Associated With MAZE Ransomware Incidents. Retrieved May 18, 2020.
×

[8]ページ先頭

©2009-2026 Movatter.jp