October 12, 2017 By Larry Loeb 2 min read

Since the start of 2017, security researchers have observed a cybergang known as FIN7 spreading malware by using LNK files embedded in Word documents via the standard Object Linking and Embedding (OLE) technology. The malware spread is usually the group’s own custom backdoor called HALFBAKED.

However, security firm ICEBRG reported that FIN7 has gone beyond messing with its payload to slip under the security radar and has adopted new attack methods. Notably, the threat group started using OLE command (CMD) files in phishing attacks to spread and execute its malware.

FIN7 Makes Sweeping Changes

When triggered, the CMD file writes JScript to “tt.tx” under the user’s home directory. It then self-replicates and runs WScript using the file’s JScript engine, which performs the code execution.

The resultant malware has gone through some changes as well. Stages of the malware were stored in a string array, which used base64 encoding, while it was being assembled. The name of the array is now obfuscated to prevent defenders from directly searching for it. Additionally, the base64-encoded string it contained is now broken down into multiple strings within an array.

“FIN7 has demonstrated that they are highly adaptable, evading detection mechanisms while impacting a number of large U.S. retail companies over an extended period of time,” the ICEBRG report noted.

Enterprise Users Are Shark Bait for Phishing Attacks

FIN7 also added a new command, getNK2, to the malware’s arsenal. According to ICEBRG, this command targets the victim’s Microsoft Outlook email client autocomplete list in an effort to gain new potential phishing targets. As with most phishing attacks, all it takes is one user to fall victim for the threat to spread throughout an enterprise.

The threat group’s changing tactics and fluid adaptability means that security professionals must find the right balance between broad detection approaches that can generate false positives and more detailed, narrow signatures that may costs more to process.

More from

Autonomous security for cloud in AWS: Harnessing the power of AI for a secure future

3 min read - As the digital world evolves, businesses increasingly rely on cloud solutions to store data, run operations and manage applications. However, with this growth comes the challenge of ensuring that cloud environments remain secure and compliant with ever-changing regulations. This is where the idea of autonomous security for cloud (ASC) comes into play.Security and compliance aren't just technical buzzwords; they are crucial for businesses of all sizes. With data breaches and cyber threats on the rise, having systems that ensure your…

Adversarial advantage: Using nation-state threat analysis to strengthen U.S. cybersecurity

4 min read - Nation-state adversaries are changing their approach, pivoting from data destruction to prioritizing stealth and espionage. According to the Microsoft 2023 Digital Defense Report, "nation-state attackers are increasing their investments and launching more sophisticated cyberattacks to evade detection and achieve strategic priorities."These actors pose a critical threat to United States infrastructure and protected data, and compromising either resource could put citizens at risk.Thankfully, there's an upside to these malicious efforts: information. By analyzing nation-state tactics, government agencies and private enterprises are…

6 Principles of Operational Technology Cybersecurity released by joint NSA initiative

4 min read - Today’s critical infrastructure organizations rely on operational technology (OT) to help control and manage the systems and processes required to keep critical services to the public running. However, due to the highly integrated nature of OT deployments, cybersecurity has become a primary concern.On October 2, 2024, the NSA (National Security Agency) released a new CSI titled “Principles of Operational Technology Cybersecurity.” This new guide was created in collaboration with the Australian Signals Directorate’s Australian Cyber Security Centre (ASD SCSC) to…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today