August 5, 2024 By Jennifer Gregory 3 min read

Entrepreneurship is rampant these days — even across the dark web. While the paths of cyber gangs are often winding and often involve alliances or rebrandings, the newest activity of FIN7 creates a new dynamic in the cybersecurity world that organizations need to watch to reduce their vulnerabilities. SentinelOne recently followed FIN7’s activity to uncover its history and current dealings.

FIN7 attacked over 100 US companies, including household names

FIN7, a Russian advanced persistent threat (APT) group, has a long-standing reputation for sophisticated and persistent attacks on a range of industries. It is suspected of creating the software that caused the Colonial Pipeline breach. The group started in 2012 and spent several years using POS (point of sale) malware to create financial fraud throughout a wide range of industries, including hospitality, finance, energy and retail.

According to the United States Attorney’s Office, between 2015 and 2018, FIN7 breached more than 100 US companies, including Chipotle Mexican Grill, Chili’s, Arby’s, Red Robin and Jason’s Deli. The gang stole more than 15 million customer card records from over 6,500 individual POS terminals at more than 3,600 separate business locations.

Russian cyber gang embraces ransomware

Around 2021, the gang added ransomware to their repertoire and created several fraudulent info sec firms: Combi Security, Bastion Secure and others. For these attacks, the cyber criminals even hired researchers to work for their fake company and had their “employees” unknowingly conduct ransomware attacks.

After three known leaders of the gang were sent to prison, the U.S. Attorney for Washington state declared, “FIN7 is an entity no more” in May 2023. However, in late 2023, a large automotive manufacturer was attacked with malware that targeted people searching for a free networking scanning tool. BlackBerry wrote in a blog post that it had a high level of confidence that the attacker was FIN7 because the script used in the attack was identical to that used in other FIN7 Powertrash scripts.

Explore ransomware protection solutions

FIN7 now reportedly selling AvNeutralizer

Events in the last few years suggest that FIN7 is now in partnership with AvNeutralizer. SentinelOne discovered that FIN7 has been connected to “the use of EDR evasion tools [AvNeutralizer] in ransomware attacks involving the Black Basta group.” By using AvNeutralizer, also known as AuKill, hackers can tamper with security solutions and then launch their own attacks. Originally, experts only saw Black Basta using the tool and assumed it was a partnership between the two groups.

“Since early 2023, our telemetry data reveals numerous intrusions involving various versions of AvNeutralizer,” wrote SentinelOne. “About 10 of these are attributed to human-operated ransomware intrusions that deployed well-known RaaS payloads including AvosLocker, MedusaLocker, BlackCat, Trigona and LockBit.”

The tool has now been linked to five different groups, which now makes it likely that Black Basta was simply an early adopter.

Reports indicate that FIN7 is selling AvNeutralizer on Russian-speaking hacking forums ranging in price from $4,000 to $15,000. The post advertised that the tool took three years and $1 million to develop. Additionally, the tool acts as a post-exploration framework that infiltrates enterprise networks and is not detectable by traditional antivirus software.

The impact of FIN7 selling AvNeutralizer

SentinelOne wrote that FIN7’s “development and commercialization of specialized tools like AvNeutralizer within criminal underground forums significantly enhance the group’s impact.” Because they are selling their tools, this move means that many other groups with less expertise and experience can now launch exceptionally sophisticated attacks very quickly. Additionally, AvNeutralizer, combined with other FIN7 tools, makes the group even more dangerous than before.

“The proficiency of FIN7 in executing sophisticated cyberattacks relies on their versatile arsenal, which includes tools such as Powertrash, Diceloader, Core Impact, an SSH-based backdoor and AvNeutralizer,” wrote SentinelOne. “Each of these tools supports various attack phases carried out during the intrusions, allowing the group to adeptly infiltrate, exploit, persist and evade detection.”

With the re-emergence of FIN7 as well as the selling of AvNeutralizer, cybersecurity professionals need to track the current actions of the group to reduce vulnerability and spot an attack early. Although cyber gangs evolving is common in cybersecurity, this current development is concerning and one to watch.

To learn how IBM X-Force can help you with anything regarding cybersecurity including incident response, threat intelligence, or offensive security services schedule a meeting here.

If you are experiencing cybersecurity issues or an incident, contact X-Force to help: US hotline 1-888-241-9812 | Global hotline (+001) 312-212-8034.

More from News

The rising threat of cyberattacks in the restaurant industry

2 min read - The restaurant industry has been hit with a rising number of cyberattacks in the last two years, with major fast-food chains as the primary targets. Here’s a summary of the kinds of attacks to strike this industry and what happened afterward. Data breaches have been a significant issue, with several large restaurant chains experiencing incidents that compromised the sensitive information of both employees and customers. In one notable case, a breach affected 183,000 people, exposing names, Social Security numbers, driver's…

DHS awards significant grant to improve tribal cybersecurity

4 min read - The Department of Homeland Security (DHS) has awarded $18.2 million in grants through the Tribal Cybersecurity Grant Program to boost cybersecurity defenses among Native American Indian Tribes. The program takes a big step in addressing the unique digital threats faced by tribal communities — a dedicated effort to improve cybersecurity infrastructure across these regions. The $18.2 million grant is just one component of DHS's broader strategy to enhance national cybersecurity. Administered by the Federal Emergency Management Agency (FEMA) in partnership…

ONCD releases request for information: Open-source software security

3 min read - Open-source software is a collective partnership across the development community that requires both private and public buy-in. However, securing open-source software can be tricky. With so many different people working on the coding, security measures are often overlooked, increasing the chances that a vulnerability will fall through the cracks and be exploited. The Open-Source Software Security Initiative (OS31) aims to provide governance over open-source security processes. After the Log4Shell vulnerability, securing open-source software became a top priority for the federal…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today