Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Fin6 uses fake resumes located AWS, for delivery more_eggs malicious software
Global Security

Fin6 uses fake resumes located AWS, for delivery more_eggs malicious software

AdminBy AdminJune 10, 2025No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


June 10, 2025Red LakshmananPhishing / cybercrime

Financially motivated actor threats known as Fin6 The use of counterfeit resumes located on Amazon Web Services (AWS) has been noted to deliver a malware called More_eggs.

“Imagination as a job seekers and initiate conversations through platforms such as LinkedIdin and indeed, the group creates a connection with the recruiters before delivering phishing messages that lead to malware,” – team Domaintools (DTI) – Note In a report that shared with Hacker News.

More_eggs – This is the work of another cybercrime group called Golden chickens (AKA Venom Spider), which has recently been attributed to new families of malware such as TerrasteAlerv2 and Terralogger. Based on JavaScript, it is capable of providing accounts for theft, access to the system and subsequent attacks, including redemption.

One of the famous customers malicious programs is Fin6 (he’s camouflage boo Initially oriented Sales (POS) systems in hospitality and retail sectors to steal the payment card details and profits from them. It has been operating since 2012.

Cybersecurity

In the hacking group there is also a history of use Magecart Javascript Skimmers target e -commerce sites to collect financial information.

According to the Visa payment card company, Fin6 has debt More_eggs as the first stage of useful load back in 2018 to penetrate several e -commerce traders and enter the malicious JavaScript code into the scythe’s final target.

“Data on stolen payment cards are later monetized by the group, sold to mediators or are sold openly in markets such as Jokerstash, before it stopped in early 2021,” “Secureworks notes The actor’s profile threats.

The last FIN6 activity involves the use of social engineering for initiate contact with recruits On professional job platforms, such as LinkedIn, and indeed, posing as a job seeker to distribute the link (eg Bobbyweisman (.) Com, Ryanbergardi (.) Com), which involves holding its resume.

Domaintools noted that fictitious domains, which masquerade as personal portfolios are anonymously registered through Godaddy for an additional layer of exacerbation, which complicates the attribution and attracts efforts.

“Using Godaddy’s privacy services in the domain, Fin6 also protects the valid registrar data from a public view and team,” the company said. “Although Godaddy is a reputable and widely used domain registrar, its built -in privacy features make it easy to hide its identity.”

Another characteristic aspect is the use of trusted cloud services such as AWS Elastic Compute Cloud (EC2) or S3, to place phishing sites. What’s more, the sites are shipped with built -in road filtration logic to make sure that only potential victims submit a link to download the alleged resume after completing the CAPTCHA check.

Cybersecurity

“Only users who are supposed to be on residential IP addresses and use common Windows browsers is allowed to download a malicious document,” Domaintools said. “When a visitor comes from the famous VPN service, cloud infrastructure is like AWS, or corporate security scanners, the site instead provides a harmless simple text version of the resume.”

The uploaded resume takes the form of the ZIP archive, which when opening causes a sequence of infection Expand the malicious software more_eggs.

“The Skeleton Spider Fin6 shows how effective phishing companies with low complexity can be when paired with cloud infrastructure and advanced evasion,” the researchers concluded. “Using realistic baits, bypassing the scanners and hiding malicious programs behind the walls of CAPTCHA, they remain ahead of many detection tools.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025

Why DNS Safety – Your First Cyber ​​Protection?

June 11, 2025

Interpol Demonrates 20,000+ malicious IPS related to 69 malware work

June 11, 2025

GPS Sinotrack GPS devices are vulnerable to distance driving through default passwords

June 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025

Why DNS Safety – Your First Cyber ​​Protection?

June 11, 2025

Interpol Demonrates 20,000+ malicious IPS related to 69 malware work

June 11, 2025

GPS Sinotrack GPS devices are vulnerable to distance driving through default passwords

June 11, 2025

Microsoft Patches 67 vulnerability, including Zero-Day Webdav, is exploited in the wild

June 11, 2025

Researchers disclose configuration risks, including five CVE, in the Salesforce Industry Cloud

June 10, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.