Rewterz
Rewterz Threat Alert – GuLoader Malspam Campaign – Active IOCs
August 25, 2022
Rewterz
Rewterz Threat Update – France Hospital Center Hospitalier Sud Francilien Hit By A Ransomware Attack
August 25, 2022

Rewterz Threat Alert – FIN7 APT – Active IOCs

Severity

High

Analysis Summary

This financially-motivated advance persistence threat group is one of the most prolific cyber threat actor gangs in the world which has added ransomware to its attack arsenal. The organization gained infamy in 2014 after it stole a total of $1 billion from over 100 companies around the world. REvil has also been used by the threat group until they created their own RaaS (Ransomware as a Service), Darkside. The group has been behind many notorious hacks of 2018 and has also been linked to Ryuk. Researchers think FIN7 has a well-funded research and testing division that enables it avoid detection by antivirus and scanners.

The gang leverages PowerShell to automate tasks and maintain configurations throughout all of its intrusions, including a new backdoor named PowerPlant. In addition to the usual phishing techniques, its initial access methods have expanded to encompass software supply chain breach and the exploitation of stolen credentials.

Impact

  • Information Theft and Espionage

Indicators of Compromise

MD5

  • fb4696c4c8b1c1dfb2e74248bd22ed84
  • ef94e0c8d6ca99dcda02476ca2fddd3f

SHA-256

  • 520c825191a3924964e52385a8310bfd7b6a36e5b7ff07d4f9388024a2b74a95
  • 0fde3063fc11bf3901d5323487e7407c30df22bee7d694e44aa689e9e755f74d

SHA-1

  • cac5292335d60684d14bcc9fce39b61c689f8878
  • 3ea2921a3619eaf9a95eb023a22215005924e8bb

URL

https[:]//195[.]123[.]218[.]99/

Remediation

  • Logging – Log your eCommerce environment’s network activity and web server activity.
  • Passwords – Implement strong passwords.
  • Admin Access – limit access to administrative accounts and portals to only relevant personnel and make sure they are
  • not publicly accessible.
  • WAF – Set up a Web Application Firewall with rules to block suspicious and malicious requests.
  • Patch – Patch and upgrade any platforms and software timely. Prioritize patching known exploited vulnerabilities.
  • 2FA – Enable two-factor authentication.
  • Antivirus – Enable antivirus and anti-malware software and update signature definitions in a timely manner.