Hacking group FIN6 changes tactics and aims at e-commerce websites

Card-skimming code injected into online checkout pages of retailers

Hacking on keyboard

Hackers have been discovered injecting malware into compromised e-commerce websites that steal payment card data from unsuspecting victims.

According to a blog post by security researchers at IBM X-Force Incident Response and Intelligence Services (IRIS), FIN6 (a.k.a. ITG08) is better known for targeting point of sale (PoS) terminals in Europe and the US but lately has changed tactics.

It a new campaign, hackers have been found injecting malicious code into online checkout pages of compromised websites a technique known as online skimming thereby stealing payment card data transmitted to the vendor by unsuspecting customers.

Researchers said that the cyber criminal gang has been actively attacking multinational organisations, targeting specific employees with spear-phishing emails advertising fake job advertisements and repeatedly deploying the More_eggs JScript backdoor malware (aka Terra Loader, SpicyOmelette).

They added that this backdoor has been sold on the dark web by an underground malware as a service (MaaS) provider.

The gang are also used common tactics from earlier campaigns, such as Windows Management Instrumentation (WMI) to automate the remote execution of PowerShell scripts, PowerShell commands with base64 encoding, and Metasploit and PowerShell to move laterally and deploy malware.

They have also used Comodo code-signing certificates several times during the course of the campaign.

To gain entry into an organisation's infrastructure, the gang targeted employees via LinkedIn messaging and email, advertising fake jobs.

"In one case, we uncovered evidence indicating that the attacker had established communication with a victim via email and convinced them to click on a Google Drive URL purporting to contain an attractive job advert," researchers said.

"Once clicked, the URL displayed the message, Online preview is not available,' then presented a second URL leading to a compromised or rogue domain, where the victim could download the payload under the guise of a job description."

That URL, in turn, downloaded a ZIP file containing a malicious Windows Script File (WSF) that initiated the infection routine of the More_eggs backdoor.

Once in, hackers then used WMI and PowerShell techniques to perform network reconnaissance and move laterally within the environment.

"The attackers used this technique to remotely install a Metasploit reverse TCP stager on select systems, subsequently spawning a Meterpreter session and Mimikatz," said researchers.

Mimikatz is a post-exploitation tool that allows attackers to steal credentials.

"Stolen credentials are usually leveraged to facilitate privilege-escalation and further lateral movement through the compromised environment," said researchers.

The hackers then planted backdoors on several other devices to enable the hackers to find more ways into a victim's network.

Researchers said that the gang has been around for four years: "Its attacks are financially motivated, sophisticated and persistent. The group historically has specialized in stealing payment card data from POS machines and has more recently expanded operations to target card-not-present data from online transactions."

Featured Resources

BIOS security: The next frontier for endpoint protection

Today’s threats upend traditional security measures

Download now

The role of modern storage in a multi-cloud future

Research exploring the impact of modern storage in defining cloud success

Download now

Enterprise data protection: A four-step plan

An interactive buyers’ guide and checklist

Download now

The total economic impact of Adobe Sign

Cost savings and business benefits enabled by Adobe Sign

Download now

Recommended

8 of the most secure web browsers
web browser

8 of the most secure web browsers

25 Sep 2020
Your essential guide to internet security
Security

Your essential guide to internet security

23 Sep 2020
How to enable private browsing on any device
privacy

How to enable private browsing on any device

22 Sep 2020
Third-party apps are tracking your WhatsApp activity
social media

Third-party apps are tracking your WhatsApp activity

21 Sep 2020

Most Popular

16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020
Google removes 17 apps infected with evasive ‘Joker’ malware
malware

Google removes 17 apps infected with evasive ‘Joker’ malware

28 Sep 2020