FIN7, a notorious cybercrime syndicate, has launched a spear-phishing campaign against the U.S. automotive industry, leveraging the Carbanak backdoor. Exploiting IT personnel with elevated privileges, they entice victims with a fraudulent IP scanning tool, aiming to establish a foothold in systems using living off the land binaries, scripts, and libraries (LOLBAS). This incident underscores FIN7’s adaptability and persistence in targeting various industry verticals for financial gain.
The spear-phishing emails initiate the attack, directing recipients to a fake website masquerading as Advanced IP Scanner. From there, victims are redirected to an attacker-controlled Dropbox, downloading the malicious executable WsTaskLoad.exe onto their machines. This binary initiates a multi-stage process, ultimately leading to the execution of Carbanak and potentially additional payloads such as POWERTRASH.
While the ultimate intentions of the threat actors remain unclear, the swift detection and removal of the infected system prevented further lateral movement and potential deployment of ransomware. However, the discovery of similar malicious domains suggests a broader campaign by FIN7, posing an ongoing threat to organizations beyond the automotive sector. To mitigate such risks, organizations are advised to remain vigilant against phishing attempts, implement multi-factor authentication, maintain up-to-date software, and monitor for suspicious activities.