Financial Threat Groups

Financial threat groups (FIN) comprise of actors that target financial institutions. The following rules detect the presence of FIN groups based on publicly available information.

FIN4

This is a collection of rules based on the presence of indicators of compromise publicly reported as associated with this malicious actor.

Other names for this group include: Wolf Spider

Suspicious DNS Request - FIN4 Related Domain Observed

Description

This detection identifies a request to resolve a domain publicly known to be associated with this specific malicious actor. Please be aware that malicious actors will often use compromised legitimate websites for malicious purposes.

Recommendation

The alert may be related to normal web browsing activity by the end user. Review the alert in question. If necessary, rebuild the host from a known, good source and have the user change their password.

Suspicious Process - FIN4 Related Binary Executed

Description

This detection identifies the execution of a file with a hash publicly known to be associated with this specific malicious actor. Please be aware that malicious actors will often use common System Administration tools for malicious purposes.

Recommendation

Review the alert in question. If necessary, rebuild the host from a known, good source and have the user change their password.

Suspicious Web Request - FIN4 Related Domain Observed

Description

This detection identifies a request to a domain publicly known to be associated with this specific malicious actor. Please be aware that malicious actors will often compromise legitimate websites to use for malicious purposes.

Recommendation

The alert may be related to normal web browsing activity by the end user. Review the alert in question. If necessary, rebuild the host from a known, good source and have the user change their password.

FIN5

This is a collection of rules based on the presence of indicators of compromise publicly reported as associated with this malicious actor.

Suspicious DNS Request - FIN5 Related Domain Observed

Description

This detection identifies a request to resolve a domain publicly known to be associated with this specific malicious actor. Please be aware that malicious actors will often use compromised legitimate websites for malicious purposes.

Recommendation

The alert may be related to normal web browsing activity by the end user. Review the alert in question. If necessary, rebuild the host from a known, good source and have the user change their password.

Suspicious Process - FIN5 Related Binary Executed

Description

This detection identifies the execution of a file with a hash publicly known to be associated with this specific malicious actor. Please be aware that malicious actors will often use common System Administration tools for malicious purposes.

Recommendation

Review the alert in question. If necessary, rebuild the host from a known, good source and have the user change their password.

Suspicious Web Request - FIN5 Related Domain Observed

Description

This detection identifies a request to a domain publicly known to be associated with this specific malicious actor. Please be aware that malicious actors will often compromise legitimate websites to use for malicious purposes.

Recommendation

The alert may be related to normal web browsing activity by the end user. Review the alert in question. If necessary, rebuild the host from a known, good source and have the user change their password.

FIN6

This is a collection of rules based on the presence of indicators of compromise publicly reported as associated with this malicious actor.

Other names for this group include: ITG08 Skeleton Spider

Suspicious DNS Request - FIN6 Related Domain Observed

Description

This detection identifies a request to resolve a domain publicly known to be associated with this specific malicious actor. Please be aware that malicious actors will often use compromised legitimate websites for malicious purposes.

Recommendation

The alert may be related to normal web browsing activity by the end user. Review the alert in question. If necessary, rebuild the host from a known, good source and have the user change their password.

Suspicious Process - FIN6 Related Binary Executed

Description

This detection identifies the execution of a file with a hash publicly known to be associated with this specific malicious actor. Please be aware that malicious actors will often use common System Administration tools for malicious purposes.

Recommendation

Review the alert in question. If necessary, rebuild the host from a known, good source and have the user change their password.

Suspicious Web Request - FIN6 Related Domain Observed

Description

This detection identifies a request to a domain publicly known to be associated with this specific malicious actor. Please be aware that malicious actors will often compromise legitimate websites to use for malicious purposes.

Recommendation

The alert may be related to normal web browsing activity by the end user. Review the alert in question. If necessary, rebuild the host from a known, good source and have the user change their password.

FIN7

This is a collection of rules based on the presence of indicators of compromise publicly reported as associated with this malicious actor.

Other names for this group include: Anunak Carbon Spider

Suspicious DNS Request - FIN7 Related Domain Observed

Description

This detection identifies a request to resolve a domain publicly known to be associated with this specific malicious actor. Please be aware that malicious actors will often use compromised legitimate websites for malicious purposes.

Recommendation

The alert may be related to normal web browsing activity by the end user. Review the alert in question. If necessary, rebuild the host from a known, good source and have the user change their password.

Suspicious Process - FIN7 Related Binary Executed

Description

This detection identifies the execution of a file with a hash publicly known to be associated with this specific malicious actor. Please be aware that malicious actors will often use common System Administration tools for malicious purposes.

Recommendation

Review the alert in question. If necessary, rebuild the host from a known, good source and have the user change their password.

Suspicious Web Request - FIN7 Related Domain Observed

Description

This detection identifies a request to a domain publicly known to be associated with this specific malicious actor. Please be aware that malicious actors will often compromise legitimate websites to use for malicious purposes.

Recommendation

The alert may be related to normal web browsing activity by the end user. Review the alert in question. If necessary, rebuild the host from a known, good source and have the user change their password.

FIN8

This is a collection of rules based on the presence of indicators of compromise publicly reported as associated with this malicious actor.

Suspicious DNS Request - FIN8 Related Domain Observed

Description

This detection identifies a request to resolve a domain publicly known to be associated with this specific malicious actor. Please be aware that malicious actors will often use compromised legitimate websites for malicious purposes.

Recommendation

The alert may be related to normal web browsing activity by the end user. Review the alert in question. If necessary, rebuild the host from a known, good source and have the user change their password.

Suspicious Process - FIN8 Related Binary Executed

Description

This detection identifies the execution of a file with a hash publicly known to be associated with this specific malicious actor. Please be aware that malicious actors will often use common System Administration tools for malicious purposes.

Recommendation

Review the alert in question. If necessary, rebuild the host from a known, good source and have the user change their password.

Suspicious Web Request - FIN8 Related Domain Observed

Description

This detection identifies a request to a domain publicly known to be associated with this specific malicious actor. Please be aware that malicious actors will often compromise legitimate websites to use for malicious purposes.

Recommendation

The alert may be related to normal web browsing activity by the end user. Review the alert in question. If necessary, rebuild the host from a known, good source and have the user change their password.

FIN10

This is a collection of rules based on the presence of indicators of compromise publicly reported as associated with this malicious actor.

Suspicious DNS Request - FIN10 Related Domain Observed

Description

This detection identifies a request to resolve a domain publicly known to be associated with this specific malicious actor. Please be aware that malicious actors will often use compromised legitimate websites for malicious purposes.

Recommendation

The alert may be related to normal web browsing activity by the end user. Review the alert in question. If necessary, rebuild the host from a known, good source and have the user change their password.

Suspicious Process - FIN10 Related Binary Executed

Description

This detection identifies the execution of a file with a hash publicly known to be associated with this specific malicious actor. Please be aware that malicious actors will often use common System Administration tools for malicious purposes.

Recommendation

Review the alert in question. If necessary, rebuild the host from a known, good source and have the user change their password.

Suspicious Web Request - FIN10 Related Domain Observed

Description

This detection identifies a request to a domain publicly known to be associated with this specific malicious actor. Please be aware that malicious actors will often compromise legitimate websites to use for malicious purposes.

Recommendation

The alert may be related to normal web browsing activity by the end user. Review the alert in question. If necessary, rebuild the host from a known, good source and have the user change their password.