26 August 2021

FIN8 cybercriminal group adds new "Sardonic" backdoor to its arsenal


FIN8 cybercriminal group adds new "Sardonic" backdoor to its arsenal

FIN8, a financially motivated threat actor known for its attacks on companies in retail, hospitality, and entertainment industries, has been observed using a new backdoor, dubbed "Sardonic", in a recent unsuccessful attack against an unnamed financial institution in the U.S.

According to researchers at cybersecurity firm Bitdefender, the backdoor appears to be under active development and “is extremely potent and has a wide range of capabilities that help the threat actor leverage new malware on the fly without updating components.”

Written in C++, the Sardonic backdoor allows its operators to collect system information, execute arbitrary commands, and load and execute additional plugins.

Active since 2016, the FIN8 group has been leveraging known malware such as PUNCHTRACK and BADHATCH to infect PoS systems and steal payment card data.

In the most recent campaign analyzed by Bitdefender, the attackers conducted network reconnaissance, gathering information about the domain (users, domain controllers) and continued with lateral movement and privilege escalation.

“The BADHATCH loader was deployed using PowerShell scripts downloaded from the 104.168.237[.]21 IP address using the legitimate sslip.io service. It was used during the reconnaissance, lateral movement, privilege escalation and possibly impact stages,” the researchers said.

Bitdefender noted that the group had made multiple attempts to deploy the Sardonic backdoor on domain controllers in order to continue with privilege escalation and lateral movement, but the malicious command lines were blocked. The researchers said they had not observed BADHATCH being deployed on these targets, however, they found some artifacts indicating that the threat actors intended to deploy both backdoors.


Back to the list

Latest Posts

Security researcher published PoC exploit for Zoho ManageEngine ADAudit Plus bug

Security researcher published PoC exploit for Zoho ManageEngine ADAudit Plus bug

Using this vulnerability, a cybercriminal can get the remote access to sensitive information.
4 July 2022
Microsoft found Raspberry Robin worm in networks of hundreds of organizations

Microsoft found Raspberry Robin worm in networks of hundreds of organizations

While Raspberry Robin was first discovered in September 2021, it was active long before that.
4 July 2022
Half of 2022's 0-days are variants of 2021’s 0-days

Half of 2022's 0-days are variants of 2021’s 0-days

In the first half of 2022, Google’s Project Zero team identified eighteen 0-day vulnerabilities, and at least nine of them are variants of previously fixed flaws.
4 July 2022