×

Register to Access Intelligence Summary

First Name
Last Name
Job Title
Company
Country
State
Thank you!
Error - something went wrong!
   

Weekly Intelligence Summary 11 September 2020

September 11, 2020

An operations security (OpSec) failure by the threat group “FIN7” led to an unintentional exposure of their new tools, campaigns, and underground affiliations. Security researchers conducted a cyber-security operation that granted them access to the threat group’s communication channels, and have published reports that offer unique insight into one of the world’s most notorious threat groups. FIN7 was seemingly developing new loader malware, called Tirion, to replace the previously used “Carbanak” backdoor. Tirion features many new capabilities for information gathering, lateral movement, reconnaissance, and code execution. Researchers also uncovered new data about BadUSB attacks that occurred in early 2020. The reports will probably not significantly affect FIN7’s operations, but it is realistically possible that they will modify some tactics, techniques, and procedures (TTPs) in response.

Previous Report
Weekly Intelligence Summary 18 September 2020
Weekly Intelligence Summary 18 September 2020

Three state-linked threat groups have reportedly conducted cyber attacks aimed at the US Democratic and Rep...

Next Report
Weekly Intelligence Summary 04 September 2020
Weekly Intelligence Summary 04 September 2020

A wave of extortion attacks has interrupted operations in the financial services and retail sectors with th...

×

Want these
Threat Intelligence reports sent straight to your inbox?

Subscribe below!

First Name
Last Name
Company
Country
State- optional
Job Title
Thank you!
Error - something went wrong!