FIN7 Targets U.S. Carmaker’s IT Department in Spear-Phishing Assault
BlackBerry Reports: FIN7 Launches Spear-Phishing Attack on U.S. Carmaker’s IT Department
In a recent disclosure by BlackBerry researchers, it has been revealed that the financially motivated cybercrime group FIN7 targeted a prominent U.S. automotive manufacturer through a sophisticated spear-phishing campaign in late 2023.
FIN7, also known as Carbanak, strategically aimed at employees within the carmaker’s IT department who held elevated administrative privileges. The attackers exploited the guise of a free IP scanning tool to infiltrate systems with the Anunak backdoor, utilizing living-off-the-land binaries, scripts, and libraries (lolbas) for initial access.
See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses
Employing deceptive tactics, the threat actors utilized typosquatting by luring victims to a malicious URL, “advanced-ip-sccanner[.]com,” impersonating the legitimate “advanced-ip-scanner[.]com” website offering a free online scanning service. Visitors to the rogue site were redirected through intermediary URLs ultimately leading to the download of a malicious executable named WsTaskLoad.exe from an attacker-controlled Dropbox.
Upon execution, WsTaskLoad.exe initiated a complex multi-stage process involving DLLs, WAV files, and shellcode execution, culminating in the loading and decryption of a file named ‘dmxl.bin,’ housing the Anunak payload.
Trending: 10 Misconceptions about Hacking
Trending: Offensive Security Tool: WAF Bypass