Common Information
Type | Value |
---|---|
Value |
G0051 |
Category | Actor |
Type | Threat-Actor |
Misp Type | Cluster |
Description | FireEye has observed multiple targeted intrusions occurring in North America — predominately in Canada — dating back to at least 2013 and continuing through at least 2016, in which the attacker(s) have compromised organizations’ networks and sought to monetize this illicit access by exfiltrating sensitive data and extorting victim organizations. In some cases, when the extortion demand was not met, the attacker(s) destroyed production Windows systems by deleting critical operating system files and then shutting down the impacted systems. Based on near parallel TTPs used by the attacker(s) across these targeted intrusions, we believe these clusters of activity are linked to a single, previously unobserved actor or group that we have dubbed FIN10. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2023-06-14 | 9 | What Are Today’s Top Cyber Weapons? | ||
Details | Website | 2022-09-06 | 50 | Adversaries Actively Utilizing PowerShell Empire | ||
Details | Website | 2021-12-07 | 131 | FIN13: Un actor de amenaza cibercriminal, enfocado en México | Mandiant | ||
Details | Website | 2021-12-07 | 130 | FIN13: A Cybercriminal Threat Actor Focused on Mexico | Mandiant | ||
Details | Website | 2018-03-23 | 1 | GDPR's noble intentions could lead to attackers blackmailing enterprises | ||
Details | Website | 2017-06-19 | 1 | 2017-6-19 Global Cyber Attack Reports - Check Point Research |