Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025

Russia related to APT28, exploited by Mdaemon Zero-Day to crack up web-shaped servers

May 15, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » FIN7 Group advertises security bypass tool on Dark Web forums
Global Security

FIN7 Group advertises security bypass tool on Dark Web forums

AdminBy AdminJuly 17, 2024No Comments5 Mins Read
Security-Bypassing Tool
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Security bypass tool

A financially motivated threat actor known as FIN7 has been spotted using multiple aliases on several underground forums to likely promote a tool known to be used by ransomware groups such as Black Basta.

“AvNeutralizer (aka AuKill), a highly specialized tool developed by FIN7 to manipulate security solutions, is sold in the criminal underground and used by various ransomware groups,” according to cybersecurity firm SentinelOne said in a report shared with The Hacker News.

FIN7, an electronic crime group of Russian and Ukrainian origin, was a a constant threat has since at least 2012 shifted from an initial focus on point-of-sale (PoS) terminals to operating as a ransomware affiliate for now-defunct gangs such as REvil and Conti, before launching its own ransomware-as-a-service (RaaS) programs DarkSide and BlackMatter .

The threat actor, which also goes by the names Carbanak, Carbon Spider, Gold Niagara, and Sangria Tempest (formerly Elbrus), has a track record of creating shell companies like Combi Security and Bastion Secure to lure unwitting software engineers into ransomware under the guise of penetration testing.

Cyber ​​security

Over the years, FIN7 has demonstrated a high level of adaptability, sophistication and technical expertise, retooling its malware arsenal – POWERTRASH, LOADER (aka IceBot, Lizar, or Tirion), and a penetration testing tool called Core Impact which comes via the POWERTRASH bootloader – notwithstanding arrests and sentences with some of its members.

This is evidenced by the group’s large-scale phishing campaigns to spread ransomware and other malware families by deploying thousands of “shell” domains that mimic legitimate media and technology companies, according to a recent report by Silent Push.

Alternatively, these shell domains were sometimes used in a normal redirect chain to send users to fake login pages posing as property management portals.

These versions of typosquat are advertised on search engines like Google, tricking users looking for popular software into downloading the malware version instead. Some of the targeted tools include 7-Zip, PuTTY, AIMP, Notepad++, Advanced IP Scanner, AnyDesk, pgAdmin, AutoDesk, Bitwarden, Rest Proxy, Python, Sublime Text, and Node.js.

It should be noted that FIN7 used the tactic of malicious advertising highlighted earlier both eSentire and Malwarebytes in May 2024, with chain attacks leading to the deployment of the NetSupport RAT.

“FIN7 leases a large number of dedicated IP addresses on a number of hosts, but primarily on Stark Industriesa popular bulletproof hosting provider that has been linked to DDoS attacks in Ukraine and across Europe,” Silent Push noted.

SentinelOne’s latest findings show that FIN7 not only used multiple personas on cybercrime forums to promote the sale of AvNeutralizer, but also improvised the tool with new capabilities.

This is based on the fact that since January 2023, several ransomware groups have started using updated versions of the EDR degradation program that were intended exclusively for Black Basta group until then.

SentinelLabs researcher Antonio Coccamazzi told The Hacker News that advertising AvNeutralizer on underground forums should not be considered a new malware-as-a-service (MaaS) tactic adopted by FIN7 without further evidence.

“FIN7 has a history of developing and using sophisticated tools for its own operations,” Kokamazzi said. “However, selling tools to other cybercriminals can be seen as a natural evolution of their methods of diversification and generating additional income.”

“Historically, FIN7 has used underground markets to generate income. For example, the Ministry of Justice informed that since 2015, FIN7 has successfully stolen data from more than 16 million payment cards, many of which were sold on underground markets. While this was more common in the pre-ransomware era, AvNeutralizer’s current advertising may indicate a shift or expansion in their strategy.”

“This may be motivated by the increased protection that modern EDR solutions provide compared to previous AV systems. As these defenses have improved, the demand for degradation tools like AvNeutralizer has grown significantly, especially among ransomware operators. Attackers now face tougher challenges in circumventing these defenses. , which makes such tools very valuable and expensive.”

For its part, the updated version of AvNeutralizer uses anti-analysis techniques and, most importantly, uses a built-in Windows driver called “ProcLaunchMon.sys“together with Process Explorer a driver for tampering with security and detection evasion solutions. The tool is believed to have been under active development since April 2022.

There was also a similar version of this approach put into use by the Lazarus Group, which makes it even more dangerous as it goes beyond the traditional Bring Your Own Vulnerable Driver (BYOVD) attack by weaponizing a vulnerable driver that is present by default on Windows machines.

Another noteworthy update concerns FIN7 Checkmarks platformwhich has been modified to include an automated SQL injection attack module for exploiting public applications.

“In its campaigns, FIN7 used automated attack techniques, targeting public servers through automated SQL injection attacks,” SentinelOne said. “Furthermore, its development and commercialization of specialized tools such as AvNeutralizer in criminal underground forums greatly enhances the group’s influence.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025

Russia related to APT28, exploited by Mdaemon Zero-Day to crack up web-shaped servers

May 15, 2025

Testing the handle only to meet the requirements? Time to change your approach

May 15, 2025

5 BCDR Essentials for Effective Rushing

May 15, 2025

New Chrome vulnerability allows for a cross -out data leak through a forklift policy

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025

Russia related to APT28, exploited by Mdaemon Zero-Day to crack up web-shaped servers

May 15, 2025

Testing the handle only to meet the requirements? Time to change your approach

May 15, 2025

5 BCDR Essentials for Effective Rushing

May 15, 2025

New Chrome vulnerability allows for a cross -out data leak through a forklift policy

May 15, 2025

Bion and Ransomexx Exploit SAP Netweaver Nafice for deploying Pipemagic Trojan

May 14, 2025

Samsung Patches Cve-2025-4632 used to deploy Mirai Botnet via Magicinfo 9 Exploit

May 14, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025

Russia related to APT28, exploited by Mdaemon Zero-Day to crack up web-shaped servers

May 15, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.