Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

FIN7 & Conti affiliates collaborate

April 18, 2023
Reading Time: 2 mins read
in Alerts

 

The now-defunct Conti ransomware gang has been found to have collaborated with a threat actor likely affiliated with the FIN7 cybercrime group to use a new strain of malware called Domino. This malware is designed to facilitate follow-on exploitation on compromised systems and delivers an information stealer known as Project Nemesis that has been advertised for sale on the dark web since December 2021.

IBM Security X-Force researchers have reported that former members of the TrickBot/Conti syndicate have been using Domino since at least late February 2023 to deliver Project Nemesis or more capable backdoors like Cobalt Strike.

FIN7, also known as Carbanak and ITG14, is a prolific Russian-speaking cybercriminal syndicate that deploys custom malware to deploy additional malware and broaden its monetization methods.

Recent analyses have revealed FIN7’s role as a precursor for Maze and Ryuk ransomware attacks and its connections to Black Basta, DarkSide, REvil, and LockBit families.

Domino’s potential connections to FIN7 comes from source code overlaps with DICELOADER, a malware family attributed to the group. Domino has been active in the wild since at least October 2022, and ex-Conti members have been using it since late February 2023 to install Project Nemesis.

The use of stealer malware by ransomware distributors is not new, and it has raised the possibility that information stealers are deployed during lower priority infections, while those belonging to an Active Directory domain are served with Cobalt Strike.

The use of malware with ties to multiple groups in a single campaign highlights the complexity involved in tracking threat actors and provides insight into how and with whom they operate.

It is important for organizations to stay vigilant and continuously monitor their networks for any signs of compromise to detect and respond to attacks like Domino.

Reference:
  • Ex-Conti and FIN7 actors collaborate with new backdoor

Tags: April 2023Cyber AlertCyber Alerts 2023CybercriminalsFIN7MalwareRansomwareSoftware
ADVERTISEMENT

Related Posts

Forminator Plugin Flaw Risks 600,000 Sites

Forminator Plugin Flaw Risks 600,000 Sites

July 2, 2025
Forminator Plugin Flaw Risks 600,000 Sites

Oil-Themed Phishing Spreads Snake Keylogger

July 2, 2025
Forminator Plugin Flaw Risks 600,000 Sites

Kimsuky Tricks Users Into Self Hacking

July 2, 2025
C4 Bomb Cracks Chrome Cookie Encryption

Scammers Use Fake Ads to Steal Pi Wallets

July 1, 2025
C4 Bomb Cracks Chrome Cookie Encryption

Blind Eagle Uses VBS Scripts to Deploy RATs

July 1, 2025
C4 Bomb Cracks Chrome Cookie Encryption

C4 Bomb Cracks Chrome Cookie Encryption

July 1, 2025

Latest Alerts

Oil-Themed Phishing Spreads Snake Keylogger

Forminator Plugin Flaw Risks 600,000 Sites

Kimsuky Tricks Users Into Self Hacking

Scammers Use Fake Ads to Steal Pi Wallets

Blind Eagle Uses VBS Scripts to Deploy RATs

C4 Bomb Cracks Chrome Cookie Encryption

Subscribe to our newsletter

    Latest Incidents

    Cyberattack on Brazils CM Software Vendor

    Cyberattack Halts Hero España Production

    Hacker Attack on Australian Airline Qantas

    Cyberattack Hits Austrian Hospital Vendor

    Sophisticated Attack Hits War Crimes Court

    Ransomware Hits Swiss Government Vendor

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial