19 August 2024

Researchers uncover new FIN7 infrastructure


Researchers uncover new FIN7 infrastructure

Cybersecurity researchers have uncovered new infrastructure linked to a financially motivated threat group known as FIN7, indicating that the group is continuing its operations despite previous attempts to disrupt its activities. The findings, which were detailed in a report by Team Cymru, reveal two distinct clusters of potential FIN7 activity associated with IP addresses in Russia and Estonia.

The first cluster of suspicious activity is linked to Post Ltd, a broadband provider operating in Southern Russia. The second cluster involves IP addresses assigned to SmartApe, a cloud hosting provider based in Estonia. These clusters appear to be communicating with infrastructure previously identified by the threat research group Silent Push, which recently reported that FIN7 is using Stark Industries IP addresses to host its malicious infrastructure.

Silent Push's investigation revealed upwards of 4,000 domains attributed to the group or its imitators. A significant number of these domains were hosted on Stark Industries infrastructure, with 74% of the related IP addresses obscured by Cloudflare services. This tactic is likely used to conceal the true locations of FIN7’s servers.

By analyzing network telemetry data, Team Cymru identified the communication patterns between the newly discovered clusters and the previously known Stark-assigned hosts. In the past 30 days alone, the Post Ltd cluster was observed engaging in outbound communications with at least 15 Stark-assigned hosts, while the SmartApe cluster communicated with at least 16.

Furthermore, there is significant overlap between the two clusters, with 12 of the hosts identified in the Russian Post Ltd cluster also appearing in the Estonian SmartApe cluster. This suggests a coordinated effort by FIN7 to use multiple providers across different countries to support its criminal activities.

According to Team Cymru, many large virtual private server (VPS) providers offer reseller services, allowing customers to procure infrastructure while adhering to the parent company's terms of service. The latest analysis suggests that some of FIN7's infrastructure may have been obtained through Stark Industries resellers.

Following responsible disclosure by the researchers, Stark Industries has suspended the services linked to the identified malicious activity.


Back to the list

Latest Posts

Pakistan-linked APT36 intensifies cyber espionage on Indian entities

Pakistan-linked APT36 intensifies cyber espionage on Indian entities

The threat actor has frequently targeted Indian government agencies, military installations, and diplomatic networks.
5 November 2024
Canadian authorities arrest suspected Snowflake hacker linked to major corporate data breaches

Canadian authorities arrest suspected Snowflake hacker linked to major corporate data breaches

The arrest took place on October 30, 2024, under a provisional warrant issued at the request of US authorities.
5 November 2024
China-linked Volt Typhoon reportedly breached Singapore’s largest mobile carrier Singtel

China-linked Volt Typhoon reportedly breached Singapore’s largest mobile carrier Singtel

It is believed that the Singtel breach may have served as a trial for further incursions into US telecoms networks.
5 November 2024