Security News > 2021 > October > FIN7 tries to trick pentesters into launching ransomware attacks
The FIN7 hacking group is attempting to join the highly profitable ransomware space by creating fake cybersecurity companies that conduct network attacks under the guise of pentesting.
The Gemini researchers found that FIN7 was offering between $800 and $1,200 per month to recruit C++, PHP, and Python programmers, Windows system administrators, and reverse engineering specialists by following tips from an unnamed source.
All of these skills are required for pre-encryption stages of ransomware attacks, so it appears that this is what FIN7 is going after through these hiring rounds.
The attribution to FIN7 is quite strong, even though the source code of some of these tools was publicly leaked two years ago.
Another piece of evidence is that the software was purportedly licensed to "CheckPoint Software Inc", the renowned Israeli security firm, which FIN7 has masqueraded as in other recent attacks.
FIN7 didn't provide any legal documentation for this pentesting activity, so Gemini's source realized they were probably dwelling inside a victimized company using access obtained via illegal means.
News URL
Related news
- Fidelity customers' financial info feared stolen in suspected ransomware attack (source)
- Fidelity customers' financial info feared stolen in suspected ransomware attack (source)
- Alert: GhostSec and Stormous Launch Joint Ransomware Attacks in Over 15 Countries (source)
- Duvel says it has "more than enough" beer after ransomware attack (source)
- FBI: Critical infrastructure suffers spike in ransomware attacks (source)
- JetBrains TeamCity under attack by ransomware thugs after disclosure mess (source)
- Possible China link to Change Healthcare ransomware attack (source)
- Change Healthcare registers pulse after crippling ransomware attack (source)
- BianLian Threat Actors Exploiting JetBrains TeamCity Flaws in Ransomware Attacks (source)
- JetBrains is still mad at Rapid7 for the ransomware attacks on its customers (source)