Fxmsp

Description

(AdvIntel) Throughout 2017 and 2018, Fxmsp established a network of trusted proxy resellers to promote their breaches on the criminal underground. Some of the known Fxmsp TTPs included accessing network environments via externally available remote desktop protocol (RDP) servers and exposed active directory.

Most recently, the actor claimed to have developed a credential-stealing botnet capable of infecting high-profile targets in order to exfiltrate sensitive usernames and passwords. Fxmsp has claimed that developing this botnet and improving its capabilities for stealing information from secured systems is their main goal.

Names

NameName-Giver
Fxmspself given
ATK 134Thales
TAG-CR17Recorded Future

Country

Motivation

  • Financial gain

First Seen

2016

Observed Sectors

Observed Countries

Tools

Operations

Counter Operations

Information

Other Information

Uuid

9d6819bf-0b1d-45a8-9042-f0873e2e5227

Last Card Change

2021-12-09