FIN6 Leveraging AWS for Fake LinkedIn Resumes to Spread More_Eggs Malware

Published:

spot_img

The Rising Threat of FIN6 and Its Phishing Tactics

Understanding FIN6’s Modus Operandi

The cybercrime group FIN6, notorious for its financially motivated attacks, is employing an increasingly sophisticated method to achieve its goals. Recent reports indicate that this group has been using fake resumes hosted on Amazon Web Services (AWS) to introduce malware known as More_eggs. By mimicking job seekers and interacting with recruiters on platforms such as LinkedIn and Indeed, FIN6 builds a credible rapport before launching phishing attacks.

The Mechanics of More_eggs Malware

The More_eggs malware is part of a broader toolkit developed by another cybercrime outfit, Golden Chickens, also referred to as Venom Spider. This JavaScript-based backdoor provides advanced capabilities, allowing criminals to steal login credentials, access systems, and execute further attacks such as ransomware deployment. The connection between FIN6 and More_eggs underscores a troubling trend where cybercriminals continually adapt their strategies to exploit vulnerabilities in the job market and online platforms.

The Historical Context of FIN6

FIN6 has been operational since 2012 and has a well-documented history of targeting point-of-sale (PoS) systems, primarily in the retail and hospitality sectors. Their initial aim was to capture payment card information to generate illicit profit. Over the years, they have evolved their tactics, including the use of Magecart JavaScript skimmers aimed at e-commerce sites to extract sensitive financial data from unsuspecting customers.

Recent Activities

According to Visa, the group has utilized More_eggs since at least 2018, focusing on infiltrating e-commerce platforms to inject malicious JavaScript. Their end goal remains consistent: capturing payment card data. Reports reveal that FIN6 has monetized stolen data through various channels, including selling it on dark web marketplaces like JokerStash before it was shut down in early 2021.

The latest tactics employed by FIN6 involve sophisticated social engineering. By creating fake profiles as job seekers and initiating conversations with recruiters, they direct potential victims to links that seem to host their resumes. These links—such as bobbyweisman[.]com and ryanberardi[.]com—masquerade as trustworthy personal websites.

Techniques for Evasion and Obfuscation

To make their operations more difficult to trace, FIN6 has registered these malicious domains anonymously through GoDaddy, utilizing domain privacy services. This approach effectively shields their true identities, complicating efforts for cybersecurity teams to address the threat. Although GoDaddy is a reputable domain registrar, its privacy features are sometimes exploited by malicious actors to obscure their registrations.

FIN6’s use of trusted cloud services like AWS Elastic Compute Cloud (EC2) or S3 for hosting these phishing sites significantly enhances their evasion tactics. These sites are equipped with traffic filtering systems that ensure only targeted individuals can access the malicious payload. Once a potential victim interacts with the site, they often face a CAPTCHA challenge, designed to filter out less desirable traffic.

Specific Targeting Techniques

The approach is further refined to allow downloads of the malicious document solely to users perceived to be on residential IP addresses using common Windows-based browsers. If a visitor is identified as coming from known VPNs, cloud infrastructure, or corporate security scanners, they will only receive a harmless plain-text version of the supposed resume.

When a victim successfully downloads the disguised ZIP archive, opening it triggers a sequence that installs the More_eggs malware onto their system. This strategic deployment highlights how effectively low-complexity phishing can become when integrated with advanced technology and infrastructure.

Implications for Cybersecurity

FIN6’s Skeleton Spider campaign serves as a stark reminder of how cybercriminals continue to evolve in their phishing techniques. By leveraging seemingly mundane job lures and sophisticated evasion tactics, they remain ahead of detection tools employed by cybersecurity professionals. This evolving landscape calls for heightened vigilance and innovative strategies within the cybersecurity community to effectively combat these genuine threats in the digital workforce.

spot_img

Related articles

Recent articles

Miahona Consortium Chosen as Preferred Bidder for $799 Million Arana ISTP Project

Miahona and Marafiq Selected for Major Makkah Sewage Treatment Project Key Partnership Announcement Power and Water Utility Company for Jubail and Yanbu (MARAFIQ) and Miahona Company...

Apple and Google Warn of New Global Cyber Threats

Apple and Google Warn Users of Global Cyber Threats Overview of Recent Threat Notifications In recent developments, tech leaders Apple and Google have issued urgent cyber-threat...

Walmart Shoppers Beware: Major Scam Hits Millions

A large-scale robocall scam is targeting millions of Walmart shoppers in the U.S. by impersonating the retailer’s customer service and inventing fake high-value purchases...

GCCA Celebrates Supreme Council’s Decision to Create GCC Civil Aviation Authority

GCC Civil Aviation Authority: A New Era for Gulf Air Travel A Significant Development for the Gulf Region The General Civil Aviation Authority (GCAA) of the...