26 August 2021

FIN8 cybercriminal group adds new "Sardonic" backdoor to its arsenal


FIN8 cybercriminal group adds new "Sardonic" backdoor to its arsenal

FIN8, a financially motivated threat actor known for its attacks on companies in retail, hospitality, and entertainment industries, has been observed using a new backdoor, dubbed "Sardonic", in a recent unsuccessful attack against an unnamed financial institution in the U.S.

According to researchers at cybersecurity firm Bitdefender, the backdoor appears to be under active development and “is extremely potent and has a wide range of capabilities that help the threat actor leverage new malware on the fly without updating components.”

Written in C++, the Sardonic backdoor allows its operators to collect system information, execute arbitrary commands, and load and execute additional plugins.

Active since 2016, the FIN8 group has been leveraging known malware such as PUNCHTRACK and BADHATCH to infect PoS systems and steal payment card data.

In the most recent campaign analyzed by Bitdefender, the attackers conducted network reconnaissance, gathering information about the domain (users, domain controllers) and continued with lateral movement and privilege escalation.

“The BADHATCH loader was deployed using PowerShell scripts downloaded from the 104.168.237[.]21 IP address using the legitimate sslip.io service. It was used during the reconnaissance, lateral movement, privilege escalation and possibly impact stages,” the researchers said.

Bitdefender noted that the group had made multiple attempts to deploy the Sardonic backdoor on domain controllers in order to continue with privilege escalation and lateral movement, but the malicious command lines were blocked. The researchers said they had not observed BADHATCH being deployed on these targets, however, they found some artifacts indicating that the threat actors intended to deploy both backdoors.


Back to the list

Latest Posts

Cyber Security Week in Review: April 26, 2024

Cyber Security Week in Review: April 26, 2024

In brief: Cisco and CrushFTP patch zero-days, researchers sinkhole C&C server used by PlugX malware, and more.
26 April 2024
US charges Samourai cryptomixer founders with laundering $100 million

US charges Samourai cryptomixer founders with laundering $100 million

The cryptocurrency mixer facilitated over $2 billion in illegal transactions.
25 April 2024
ArcaneDoor state-sponsored malware campaign strikes Cisco networking gear

ArcaneDoor state-sponsored malware campaign strikes Cisco networking gear

The attackers exploited two zero-day vulnerabilities in Cisco networking equipment.
25 April 2024