Up to 50,000 Office 365 users are being targeted by a phishing campaign that purports…
FIN11, a financially-motivated hacker group with a history starting since at least 2016, has adapted malicious email campaigns to transition to ransomware as the main monetization method.
The group runs high-volume operations, lately targeting companies primarily in North America and Europe from almost every industry sector to steal data and to deploy Clop ransomware.
Malicious campaigns in the early history of the gang focused on organizations in the financial, retail, and restaurant sector. Over the past couple of years, FIN11’s attacks are more indiscriminate both in terms of the victim type and geography.
Starting August, the cybercriminals attacked organizations in the defence, energy, finance, healthcare/pharmaceutical, legal, telecommunications, technology, and transportation sectors.
Security researchers at FireEye’s Mandiant told BleepingComputer that FIN11 targeted its victims with malicious emails distributing a malware downloader they track as FRIENDSPEAK.
They used a variety of lures like remittance documents, invoice delivery, or confidential information about company bonuses with malicious HTML attachments to load content (iframe or embed tags) from a likely a compromised website, often with dated content, indicating abandonment.
Kimberly Goody, Senior Manager of Analysis at Mandiant Threat Intelligence, told us that victims had to complete a CAPTCHA challenge before being served an Excel spreadsheet with malicious macro code.
Once executed, the code delivered FRIENDSPEAK, which downloaded MIXLABEL, another malware believed to be specific to FIN11. The latter was in many cases configured to contact a command and control domain that impersonated the Microsoft Store (us-microsoft-store[.[com)
In one case, they re-compromised the organization via multiple email campaigns a few months later. In another, FIN11 regained access after the company restored infected servers from backups.
The researchers do not specify the FIN11 ransom demands from the incidents they investigated but note that ransomware remediation firm Coveware indicates amounts between a few hundred thousand to $10 million.
Phishing attacks are at their historical peak in effectiveness and there’s no indication that this is going to change. It’s time to provide your users with tools in the form of new school Security Awareness Training to prepare them for when the next phishing attack occurs.
With thanks to the Cyber Defence Alliance and Bleeping Computer The full story is here: https://www.bleepingcomputer.com/news/security/fin11-hackers-jump-into-the-ransomware-money-making-scheme/
Free Phishing Security Test
Would your users fall for convincing phishing attacks? Take the first step now and find out before the bad guys do. Plus, see how you stack up against your peers with phishing Industry Benchmarks. The Phish-prone percentage is usually higher than you expect and is great ammo to get budget.
Here’s how it works:
- Immediately start your test for up to 100 users (no need to talk to anyone)
- Select from 20+ languages and customize the phishing test template based on your environment
- Choose the landing page your users see after they click
- Show users which red flags they missed, or a 404 page
- Get a PDF emailed to you in 24 hours with your Phish-prone % and charts to share with management
- See how your organization compares to others in your industry
PS: Don’t like to click on redirected buttons? Cut & Paste this link in your browser: https://info.knowbe4.com/phishing-security-test-partner?partnerid=001a000001lWEoJAAW