Fin7 aka Sangria Tempest is back on their bullshit w/ scaled up infrastructure attacking a wide range of Western targets. We’ve been working on this massive report for months and now can publicly explain that Fin7 has over 4,000 domains and IPs they are using for these attacks.🧵
Read the Krebs on Security post “The Stark Truth Behind the Resurgence of Russia’s Fin7” @ https://krebsonsecurity.com/2024/07/the-stark-truth-behind-the-resurgence-of-russias-fin7/
Read our full piece @ https://www.silentpush.com/blog/fin7/
Fin7 has been operating for over a decade, with DOJ noting there were 70+ people (https://www.justice.gov/usao-wdwa/pr/high-level-organizer-notorious-hacking-group-fin7-sentenced-ten-years-prison-scheme) within this financial crime group, “...organized into business units and teams. Some were hackers, others developed the malware installed on computers, and still others crafted the malicious emails that duped victims into infecting their company systems.” Over the last few years there was a huge push by the DOJ/FBI to take down their network, which resulted in 3 indictments and a bold statement by the DOJ in 2023 that “Fin7 as an entity is no more.”
But just weeks after the DOJ made their bold / ridiculous claim, Microsoft Threat Intelligence was already publicly saying “Financially motivated cybercriminal group Sangria Tempest (ELBRUS, FIN7) has come out of a long period of inactivity.” https://x.com/MsftSecIntel/status/1659347799442432002
For most of 2023, Fin7 was operating quieter than normal and there were few public reports about their attacks. But starting in 2024 that all changed, and there have now been reports from several respected cybersecurity companies about niche attacks they have seen through their own client visibility.
But at Silent Push, we don’t rely on client data for visibility - it’s our own data from our own scanning methods. And we scan the internet billions of times per day, at a scale that makes it possible for us to track all types of threats. We ended up getting a lead from a source which helped us pivot into more… and more… and more of the new Fin7 infrastructure.
For the past few months we’ve been sitting on thousands of their domains – watching the content change – testing and understanding their orchestration methods — and collaborating with clients and peers in the industry to ensure we knew what was going on and their targets were being warned.
During this process, we picked up phishing and malware delivery infrastructure targeting numerous major brands. Some of those include: Louvre Museum, Meta, Reuters (and WestLaw), Microsoft 365, Wall Street Journal, Midjourney, CNN, Quickbooks, Alliant, Grammarly, Airtable, Webex, Lexis Nexis, Bloomberg, Quicken, Cisco (Webex), Zoom, Investing[.]com, SAP Concur, Google, Android Developer, Asana, Workable, SAP (Ariba), Microsoft (Sharepoint), RedFin, Manulife Insurance, Regions Bank Onepass, American Express, Twitter, Costco, DropBox, Netflix, Paycor, Harvard, Affinity Energy, RuPay, Goto[.]com, Bitwarden, and Trezor.
Software being targeted includes 7-zip, PuTTY, ProtectedPDFViewer, AIMP, Notepad++, Advanced IP Scanner, AnyDesk, pgAdmin, AutoDesk, Bitwarden, Rest Proxy, Python, Sublime Text, and Node.js
We also discovered a new cybersecurity shell company cybercloudsec[.]com – which aligns to past Fin7 TTPs (https://www.justice.gov/opa/press-release/file/1084361/dl?inline). Fin7 previously created a fake computer security company called “Combi Security” which was used to recruit new members and further their attacks.
Some of the new Fin7 infrastructure will redirect some visitors to malicious phishing pages and other visitors to boring shell websites. We saw this behavior with the domain escueladeletrados[.]com which for some visitors looked like a random commercial website and other visitors were redirected to a phishing page targeting Alliant Credit Union.
We picked up Facebook Business Manager phishing pages with slick phishing kits integrated into them.
We even picked up a custom Louvre Museum phishing page that looks identical to the real thing, and is potentially targeting Paris, France visitors to the Olympics right now.
Fin7 is targeting the users of popular website host Wpengine with multiple domains setup for phishing.
We’ve also recently seen a new crypto phishing widget that Fin7 was testing on a new site, which targeted Coinbase, Metamask, Rainbow Crypto Wallet, Ronin Wallet, OKX Wallet, Trust Wallet, Exodus, Phantom, and WalletConnect. We expect to see increased crypto targeting from Fin7 in the near future.
Fin7 has also been targeting CNN + WSJ + Reuters — three major news organizations each have malware named after them which is being served to users who find their way to one of the Fin7 pages that pushes a fake browser extension. We’ve seen the WSJ + Reuters phishing pages and they look like exact copies of the real news websites. We haven’t seen a live CNN malware delivery page yet but believe they could exist or will sometime in the near future.
Fin7 also has malware delivery infrastructure that spoofs Microsoft Sharepoint.
I could go on and on about what Fin7 is doing and why everyone in the cybersecurity community needs to get them back on their radar, but I’d encourage folks to review the Krebs piece @ https://krebsonsecurity.com/2024/07/the-stark-truth-behind-the-resurgence-of-russias-fin7/ and our full research @ https://www.silentpush.com/blog/fin7/
Don’t hesitate to reach out with any questions or new leads for tracking Fin7 – thanks for everyone’s work to slow down these folks new operations!