Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Groups
  3. FIN5

FIN5

FIN5 is a financially motivated threat group that has targeted personally identifiable information and payment card information. The group has been active since at least 2008 and has targeted the restaurant, gaming, and hotel industries. The group is made up of actors who likely speak Russian.[1][2][3]

ID: G0053
Contributors: Walker Johnson
Version: 1.2
Created: 16 January 2018
Last Modified: 25 April 2025
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1119Automated Collection

FIN5 scans processes on all victim systems in the environment and uses automated scripts to pull back the results.[2]

EnterpriseT1110Brute Force

FIN5 has has used the tool GET2 Penetrator to look for remote login and hard-coded credentials.[3][2]

EnterpriseT1059Command and Scripting Interpreter

FIN5 scans processes on all victim systems in the environment and uses automated scripts to pull back the results.[2]

EnterpriseT1074.001Data Staged:Local Data Staging

FIN5 scripts save memory dump data into a specific directory on hosts in the victim environment.[2]

EnterpriseT1133External Remote Services

FIN5 has used legitimate VPN, Citrix, or VNC credentials to maintain access to a victim environment.[1][3][2]

EnterpriseT1070.001Indicator Removal:Clear Windows Event Logs

FIN5 has cleared event logs from victims.[2]

.004Indicator Removal:File Deletion

FIN5 usesSDelete to clean up the environment and attempt to prevent detection.[2]

EnterpriseT1588.002Obtain Capabilities:Tool

FIN5 has obtained and used a customized version ofPsExec, as well as use other tools such aspwdump,SDelete, andWindows Credential Editor.[2]

EnterpriseT1090.002Proxy:External Proxy

FIN5 maintains access to victim environments by usingFLIPSIDE to create a proxy for a backup RDP tunnel.[2]

EnterpriseT1018Remote System Discovery

FIN5 has used the open source tool Essential NetTools to map the network and build a list of targets.[2]

EnterpriseT1078Valid Accounts

FIN5 has used legitimate VPN, RDP, Citrix, or VNC credentials to maintain access to a victim environment.[1][3][2]

Software

References

×

[8]ページ先頭

©2009-2026 Movatter.jp