{"id":12993,"date":"2018-08-02T10:45:12","date_gmt":"2018-08-02T18:45:12","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/08\/02\/news-6760\/"},"modified":"2018-08-02T10:45:12","modified_gmt":"2018-08-02T18:45:12","slug":"news-6760","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/08\/02\/news-6760\/","title":{"rendered":"Fin7: The Inner Workings of a Billion-Dollar Hacking Group"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5b62097e798e620b765a82ae\/master\/pass\/creditcards-949126662.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Wed, 01 Aug 2018 22:06:13 +0000<\/strong><\/p>\n<p><span class=\"lede\">The Fin7 hacking <\/span>group has leeched, by <a href=\"https:\/\/www.wired.com\/story\/fin7-carbanak-hacking-group-behind-a-string-of-big-breaches\/\">at least one estimate<\/a>, well over a billion dollars from companies around the world. In the United States alone, Fin7 has stolen more than 15 million credit card numbers from over 3,600 business locations. On Wednesday, the Justice Department <a href=\"https:\/\/www.justice.gov\/opa\/pr\/three-members-notorious-international-cybercrime-group-fin7-custody-role-attacking-over-100\" target=\"_blank\">revealed<\/a> that it had arrested three alleged members of the group\u2014and even more important, detailed how it operates.<\/p>\n<p>The <a href=\"https:\/\/www.justice.gov\/opa\/press-release\/file\/1084316\/download\" target=\"_blank\">indictments<\/a> allege that three Ukrainian nationals\u2014Dmytro Fedorov, Fedir Hladyr, and Andrii Kopakov\u2014are members of Fin7, contributing to the group\u2019s years-long reign as one of the most sophisticated, and aggressive, financially motivated hacking organizations in the world. Each has been charged with 26 felony counts, ranging from conspiracy to wire fraud to computer hacking to identity theft.<\/p>\n<p class=\"paywall\">The three men allegedly had high-profile roles in Fin7: Hladyr as its systems administrator, and Fedorov and Kopakov as supervisors to groups of hackers. And although Fin7 has continued to operate since they entered custody\u2014Hladyr and Fedorov in January, and Kolpakov in June\u2014the arrests do mark law enforcement\u2019s first win against the shadowy cybercrime empire.<\/p>\n<p class=\"paywall\">\u201cThis investigation continues. We are under no illusion that we have taken this group down altogether. But we have made a significant impact,\u201d said US attorney Annette Hayes at a press conference announcing the indictments. \u201cThese hackers think they can hide behind keyboards in faraway places, and that they can escape the long arm of United States law. I\u2019m here to tell you, and I think this announcement makes clear, that they cannot do that.\u201d<\/p>\n<p class=\"paywall\">The DoJ&#x27;s announcement, along with a <a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2018\/08\/fin7-pursuing-an-enigmatic-and-evasive-global-criminal-operation.html\" target=\"_blank\">new report<\/a> by security firm FireEye, also gives unprecedented insight into how, and at what level, Fin7 operates. \u201cThey\u2019ve brought a lot of techniques that we usually see associated with a state-sponsored attacker into the financial attacker realm,\u201d says Barry Vengerik, a threat analyst at FireEye and coauthor of the Fin7 report. \u201cThey\u2019re applying a level of sophistication that we\u2019re not used to really seeing from financially motivated actors.\u201d<\/p>\n<p class=\"paywall\">On or around March 27 of last year, an employee at a Red Robin Gourmet Burgers and Brews received an email from ray.donovan84@yahoo.com. The note complained about a recent experience; it urged the recipient to open the attachment for further details. They did. Within days, Fin7 had mapped Red Robin\u2019s internal network. Within a week, it had obtained a username and password for the restaurant\u2019s point-of-sale software management tool. And inside of two weeks, a Fin7 member allegedly uploaded a file containing hundreds of usernames and passwords for 798 Red Robin locations, along with \u201cnetwork information, telephone communications, and locations of alarm panels within restaurants,\u201d according to the DoJ.<\/p>\n<p>&#x27;We are under no illusion that we have taken this group down altogether. But we have made a significant impact.&#x27;<\/p>\n<p name=\"inset-left\" class=\"inset-left-component__el\">US Attorney Annette Hayes<\/p>\n<p class=\"paywall\">The Fin7 indictment alleges nine other incidents in addition to Red Robin, and each follows roughly the same playbook. It starts with an email. It looks innocuous enough: a reservation inquiry sent to a hotel, say, or a catering company receiving an order. It doesn\u2019t necessarily even have an attachment. Just another client or customer reaching out with a question or concern.<\/p>\n<p class=\"paywall\">Then, either in that first outreach or after a few emails back and forth, comes the request: Please see the attached Word doc or rich text file, it has all the pertinent information. And if you don\u2019t open it\u2014or maybe before you even receive it\u2014someone gives you a phone call, as well, reminding you to.<\/p>\n<p class=\"paywall\">\u201cWhen targeting a hotel chain or restaurant chain, a conspirator would make a follow-up call falsely claiming that the details of a reservation request, catering order, or customer complaint could be found in the file attached to the previously delivered email,\u201d the indictment says.<\/p>\n<p class=\"paywall\">FireEye mentions one restaurant target who received a \u201clist of inspections and checks scheduled to take place,\u201d on convincing FDA letterhead. An email to a hotel victim might claim to contain a picture of a bag someone left behind in a room. The approaches varied. And while \u201cdon\u2019t open attachments from strangers\u201d is the <a href=\"https:\/\/www.wired.com\/story\/resist-phishing-attacks\/\">first rule of not getting phished<\/a>, Fin7 targeted organizations that need to do just that in the regular course of business.<\/p>\n<p class=\"paywall\">\u201cHi, my name\u2019s James Anhril i want to make a takeout order for tomorrow for 11am. The enclosed file contains the order and my personal info. Click on edit at the top of the page and than [<em>sic<\/em>] double click to unlock content,\u201d reads an example phishing email released by the DoJ. Each message was not only tailored to the specific business, it often was sent directly to the individual who would normally field that kind of request. In at least one instance, FireEye says, Fin7 even filled out a retailer\u2019s web form to lodge a complaint; the victim made the first email contact.<\/p>\n<p class=\"paywall\">And when targets did click, as one might assume, they downloaded malware onto their machines. Specifically, Fin7 hit them with a tailored version of Carbanak, which first emerged several years ago in a spate of <a href=\"https:\/\/www.nytimes.com\/2015\/02\/15\/world\/bank-hackers-steal-millions-via-malware.html\" target=\"_blank\">lucrative attacks<\/a> on banks. According to the indictment, the hackers would ensnare the compromised machine in a botnet, and through its command and control centers they would exfiltrate files, compromise other computers on the same network as the victim, and even capture screenshots and video of the workstation to steal credentials and other potentially valuable information.<\/p>\n<p class=\"paywall\">Most of all, Fin7 stole payment card data, often by compromising point-of-sale hardware at companies like Chipotle, Chili\u2019s, and Arby\u2019s. The group allegedly stole millions of payment card numbers, and later offered them for sale on black market websites like Joker\u2019s Stash.<\/p>\n<p class=\"paywall\">\u201cIf we\u2019re talking about scale, the number of affected victim organizations that we\u2019ve worked with, then they\u2019re definitely the largest,\u201d Vengerik says. But even more impressive than the organization\u2019s breadth might be its sophistication.<\/p>\n<p class=\"paywall\">The most astonishing detail from Wednesday\u2019s indictment centers less around the outcomes of Fin7\u2019s sustained hacking spree, and more the lengths it went to both achieve and conceal it.<\/p>\n<p class=\"paywall\">\u201cFIN7 used a front company, Combi Security, purportedly headquartered in Russia and Israel, to provide a guise of legitimacy and to recruit hackers to join the criminal enterprise,\u201d wrote the Justice Department in a press release. \u201cIronically, the sham company\u2019s website listed multiple US victims among its purported clients.\u201d<\/p>\n<p>&#x27;To invent your own techniques, it\u2019s just sort of next level.&#x27;<\/p>\n<p name=\"inset-left\" class=\"inset-left-component__el\">Nick Carr, FireEye<\/p>\n<p class=\"paywall\">That website has been listed as for sale since at least March, according to an <a href=\"http:\/\/web.archive.org\/web\/20180325083029\/http:\/\/combisecurity.com\/\" target=\"_blank\">archived version<\/a> of the page. What\u2019s unclear is whether the computer programmers Combi Security recruited realized that their activities weren\u2019t on the level. Industry-standard penetration testing, after all, looks a whole lot like hacking, just with a target company\u2019s blessing. \u201cThey would be handling the initial compromise and different stages, without maybe knowing the true purpose of their intrusions,\u201d says Nick Carr, senior manager at FireEye and coauthor of the company\u2019s latest Fin7 report.<\/p>\n<p class=\"paywall\">The indictment also further outlines Fin7\u2019s structure and activities. Members would often communicate through a private HipChat server, it says, and numerous private HipChat rooms, in which they would \u201ccollaborate on malware and victim business intrusions,\u201d as well as share stolen credit card data. They allegedly used another Atlassian program, Jira, for project management purposes, tracking details of the intrusion, maps of networks, and stolen data.<\/p>\n<p class=\"paywall\">While it\u2019s still not clear how many people comprise Fin7\u2014the indictment claims \u201cdozens of members with diverse skillsets\u201d\u2014its organizational prowess appears to match or exceed many companies. And its hacking skills are of a caliber usually reserved for nation-state groups.<\/p>\n<p class=\"paywall\">\u201cWe were actively responding to intrusions in networks and investigating past activity, and at the same time seeing them develop new behaviors,\u201d Carr says. \u201cTo invent your own techniques, it\u2019s just sort of next level.\u201d<\/p>\n<p class=\"paywall\">Those techniques range from a new form of <a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2017\/06\/obfuscation-in-the-wild.html\" target=\"_blank\">command line obfuscation<\/a> to a novel method of <a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2017\/05\/fin7-shim-databases-persistence.html\" target=\"_blank\">persistent access<\/a>. Most of all, Fin7 seems capable of switching up its methods on a daily basis\u2014and of rotating its targets at opportune times, shifting from banking to hotels to restaurants with ease. The DoJ indictment says the hackers recently targeted staffers at companies who handle Securities and Exchange Commission filings, an apparent bid to get an advanced look at market-moving intel.<\/p>\n<p class=\"paywall\">And FireEye says it has already seen the group apparently move its focus to financial institution customers in Europe and Central Asia. Or maybe they\u2019re splinter groups using similar techniques; despite the new spotlight from the Justice Department, there\u2019s still only so much visibility.<\/p>\n<p class=\"paywall\">Three arrests won&#x27;t stop an operation this sophisticated or wide-ranging. But the deepest look yet into the group\u2019s techniques might at least help future victims head off Fin7 before it strikes next.<\/p>\n<p class=\"related-cne-video-component__dek\">Phishing scams are getting more and more sophisticated, to the point where they\u2019re fooling even security experts. Here&#39;s how to avoid them.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/fin7-wild-inner-workings-billion-dollar-hacking-group\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5b62097e798e620b765a82ae\/master\/pass\/creditcards-949126662.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Wed, 01 Aug 2018 22:06:13 +0000<\/strong><\/p>\n<p>The Justice Department announced the arrest of three members of notorious cybercrime group Fin7\u2014and detailed some of their methods in the process.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714],"class_list":["post-12993","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12993","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12993"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12993\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12993"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12993"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12993"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}