Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » FIN7 hacker group uses malicious Google ads to spread NetSupport RAT
    Cyber Security

    FIN7 hacker group uses malicious Google ads to spread NetSupport RAT

    techempireBy techempire3 Comments4 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    FIN7 hacker group

    Financially motivated threat actors are called Fen 7 It was observed that malicious Google ads were used to deceive legitimate brands as a means of delivering MSIX installers, ultimately deploying the NetSupport RAT.

    “Threat actors are using malicious websites to impersonate well-known brands, including AnyDesk, WinSCP, BlackRock, Asana, Concur, The Wall Street Journal, Workable and Google Meet,” cybersecurity firm eSentire said in a report released earlier this week.

    FIN7 (also known as Carbon Spider and Sangria Tempest) is an ongoing electronic criminal organization that has been active since 2013, initially dabbling in attacks against point-of-sale (PoS) devices to steal payment data, and later moving to disrupting ransomware campaigns. big company.

    Internet security

    Over the years, threat actors have refined their tactics and malware libraries, adopting various custom malware families such as BIRDWATCH, Carbanak, DICELOADER (also known as Lizar and Tirion), POWERPLANT, POWERTRASH, and TERMITE, among others.

    FIN7 malware is typically deployed via spear phishing campaigns as a point of entry into a target network or host, although the group has leveraged malvertising techniques to launch attack chains in recent months.

    In December 2023, Microsoft said it observed attackers relying on Google ads to lure users to download malicious MSIX application packages, which ultimately led to the execution of POWERTRASH, a PowerShell-based in-memory implant used to load the NetSupport RAT and Gracewire.

    “Sangria Storm […] is a financially motivated cybercriminal organization currently focused on conducting intrusions that often result in data theft, followed by targeted ransomware or ransomware deployment, such as Clop ransomware.

    Multiple threat actors have abused MSIX as a malware distribution vector (possibly due to its ability to bypass security mechanisms such as Microsoft Defender SmartScreen), prompting Microsoft to disable the protocol handler by default.

    FIN7 hacker group

    In an attack observed by eSentire in April 2024, users who visited a fake website through a Google ad were shown a pop-up message urging them to download a fake browser extension, which was an MSIX file containing a PowerShell script. , which in turn collects system information and contacts the remote server to obtain another encoded PowerShell script.

    The second PowerShell payload is used to download and execute the NetSupport RAT from a server controlled by the actor.

    The Canadian cybersecurity company said it has also detected remote access Trojans being used to deliver other malware, including DICELOADER, which is delivered via a Python script.

    eSentire said: “The incident of FIN7 leveraging a trusted brand name and using deceptive online advertising to distribute NetSupport RAT and then DICELOADER highlights the ongoing threat, particularly the misuse of signed MSIX files by these actors, which has been shown to What works in their plan.

    Similar findings were independently reported by Malwarebytes, which described the campaign as targeting corporate users through malicious ads and patterns that imitate well-known brands such as Asana, BlackRock, CNN, Google Meet, SAP and the Wall Street Journal. However, the company did not blame FIN7 for this activity.

    Internet security

    Information about the FIN7 malvertising program coincides with a wave of SocGholish (also known as FakeUpdates) infections aimed at targeting business partners.

    “Adversaries are using off-the-ground techniques to collect sensitive credentials, specifically configuring web beacons in email signatures and network shares to map local and business-to-business relationships,” eSentire said. “This behavior demonstrates an interest in exploiting These relationships are used to target interested business partners.”

    Malware campaigns targeting Windows and Microsoft Office users have also been discovered previously, using cracks on popular software to spread RATs and cryptocurrency mining programs.

    Broadcom-owned Symantec said: “Once malware is installed, it often registers commands with the task scheduler to maintain persistence, allowing new malware to continue to be installed even after removal.”

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.