otx.alienvault.com
Open in
urlscan Pro
99.86.4.57
Public Scan
URL:
https://otx.alienvault.com/pulse/624c4e2fe492d9e618422ffc/edit?utm_userid=swimlanecyou&utm_content=email&utm_campaign=new_p...
Submission: On April 05 via api from US — Scanned from DE
Submission: On April 05 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
× * Browse * Scan Endpoints * Create Pulse * Submit Sample * API Integration * Login | Sign Up All * Login | Sign Up * Share Actions Subscribers (182032) Suggest Edit Clone Embed Download Report Spam FIN7 POWER HOUR: ADVERSARY ARCHAEOLOGY AND THE EVOLUTION OF FIN7 * Created 2 hours ago by AlienVault * Public * TLP: White Recent public research asserts threat groups sharing overlaps with FIN7 transitioned to targeted ransomware operations involving REVIL, DARKSIDE, BLACKMATTER, and ALPHV ransomware. Reference: https://www.mandiant.com/resources/evolution-of-fin7 Tags: FIN7, REVIL, DARKSIDE, BLACKMATTER, ALPHV, ransomware, POWERPLANT Adversary: FIN7 Industries: Transportation, Beverage, Food, Media, Medical, Financial Services, Consulting, Defense Malware Family: FIN7 Att&ck IDs: T1574 - Hijack Execution Flow , T1106 - Native API , T1012 - Query Registry , T1021 - Remote Services , T1027 - Obfuscated Files or Information , T1033 - System Owner/User Discovery , T1036 - Masquerading , T1055 - Process Injection , T1057 - Process Discovery , T1059 - Command and Scripting Interpreter , T1069 - Permission Groups Discovery , T1070 - Indicator Removal on Host , T1071 - Application Layer Protocol , T1082 - System Information Discovery , T1083 - File and Directory Discovery , T1087 - Account Discovery , T1090 - Proxy , T1095 - Non-Application Layer Protocol , T1105 - Ingress Tool Transfer , T1110 - Brute Force , T1113 - Screen Capture , T1132 - Data Encoding , T1140 - Deobfuscate/Decode Files or Information , T1195 - Supply Chain Compromise , T1199 - Trusted Relationship , T1204 - User Execution , T1213 - Data from Information Repositories , T1218 - Signed Binary Proxy Execution , T1482 - Domain Trust Discovery , T1491 - Defacement , T1497 - Virtualization/Sandbox Evasion , T1518 - Software Discovery , T1553 - Subvert Trust Controls , T1555 - Credentials from Password Stores , T1558 - Steal or Forge Kerberos Tickets , T1560 - Archive Collected Data , T1564 - Hide Artifacts , T1566 - Phishing , T1569 - System Services , T1573 - Encrypted Channel , T1583 - Acquire Infrastructure , T1588 - Obtain Capabilities , T1608 - Stage Capabilities Endpoint Security Scan your endpoints for IOCs from this Pulse! Learn more * Indicators of Compromise (49) * Related Pulses (30) * Comments (0) * History (0) COMMENTS You must be logged in to leave a comment. Refresh Comments * © Copyright 2022 AlienVault, Inc. * Legal * Status