FIN8

Description

(FireEye) We attribute the use of this EoP to a financially motivated threat actor. In the past year, not only have we observed this group using similar infrastructure and tactics, techniques, and procedures (TTPs), but they are also the only group we have observed to date who uses the downloader PUNCHBUGGY and POS malware PUNCHTRACK. Designed to scrape both Track 1 and Track 2 payment card data, PUNCHTRACK is loaded and executed by a highly obfuscated launcher and is never saved to disk.

This actor has conducted operations on a large scale and at a rapid pace, displaying a level of operational awareness and ability to adapt their operations on the fly. These abilities, combined with targeted usage of an EoP exploit and the reconnaissance required to individually tailor phishing emails to victims, potentially speaks to the threat actors’ operational maturity and sophistication.

FireEye identified more than 100 organizations in North America that fell victim to this campaign.

Names

NameName-Giver
FIN8FireEye
ATK 113Thales
SyssphinxSymantec
Storm-0288Microsoft

Country

Motivation

  • Financial crime

First Seen

2016

Observed Sectors

Observed Countries

Tools

Operations

Mitre Attack

Other Information

Uuid

92691488-ff3b-4ff0-92f1-1c732bce88d2

Last Card Change

2025-06-28