26 August 2021

FIN8 cybercriminal group adds new "Sardonic" backdoor to its arsenal


FIN8 cybercriminal group adds new "Sardonic" backdoor to its arsenal

FIN8, a financially motivated threat actor known for its attacks on companies in retail, hospitality, and entertainment industries, has been observed using a new backdoor, dubbed "Sardonic", in a recent unsuccessful attack against an unnamed financial institution in the U.S.

According to researchers at cybersecurity firm Bitdefender, the backdoor appears to be under active development and “is extremely potent and has a wide range of capabilities that help the threat actor leverage new malware on the fly without updating components.”

Written in C++, the Sardonic backdoor allows its operators to collect system information, execute arbitrary commands, and load and execute additional plugins.

Active since 2016, the FIN8 group has been leveraging known malware such as PUNCHTRACK and BADHATCH to infect PoS systems and steal payment card data.

In the most recent campaign analyzed by Bitdefender, the attackers conducted network reconnaissance, gathering information about the domain (users, domain controllers) and continued with lateral movement and privilege escalation.

“The BADHATCH loader was deployed using PowerShell scripts downloaded from the 104.168.237[.]21 IP address using the legitimate sslip.io service. It was used during the reconnaissance, lateral movement, privilege escalation and possibly impact stages,” the researchers said.

Bitdefender noted that the group had made multiple attempts to deploy the Sardonic backdoor on domain controllers in order to continue with privilege escalation and lateral movement, but the malicious command lines were blocked. The researchers said they had not observed BADHATCH being deployed on these targets, however, they found some artifacts indicating that the threat actors intended to deploy both backdoors.


Back to the list

Latest Posts

Cyber Security week in review: December 2, 2022

Cyber Security week in review: December 2, 2022

The world in brief: Samsung, LG, Mediatek certificates used to sign Android malware, researchers detail new exploit framework, and more.
2 December 2022
Security researchers unintentionally crash KmsdBot botnet

Security researchers unintentionally crash KmsdBot botnet

The malware lacked an error-checking mechanism, which allowed the researchers to deactivate it.
1 December 2022
New Heliconia framework exploits n-day flaws in Chrome, Firefox and Microsoft Defender

New Heliconia framework exploits n-day flaws in Chrome, Firefox and Microsoft Defender

The researchers have linked the framework to a Spain-based software company.
1 December 2022