A secure digital payment environment emphasizing card data security - Global Banking & Finance Review
An illustration depicting advanced security measures for cardholder data protection, highlighting the importance of going beyond PCI compliance in today's digital landscape.
Top Stories

FIREEYE REPORT IDENTIFIES HIGHLY-SOPHISTICATED CYBER THREAT GROUP AIMING TO CHEAT WALL STREET

Published by Gbaf News

Posted on December 3, 2014

3 min read

· Last updated: November 28, 2018

Add as preferred source on Google

FireEye Uncovers FIN4 Cyber Threat Group

Year-long Investigation by FireEye Reveals the Group FIN4 as a Potentially US-Based, Heavily Targetting Publicly Traded Healthcare and Pharmaceutical Companies

FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today’s advanced cyber-attacks, released a comprehensive intelligence report that assesses that a financially motivated advanced threat group has been carrying out ongoing attacks against publicly traded companies in a likely attempt to play the stock market.

FIN4 Tactics: Industry Knowledge and Methods

The report – Hacking The Street? FIN4 Likely Playing the Market – details the work of a team of native-English speaking operators with extensive knowledge of the nuances in industries they targeted as well as financial practices. Designated by FireEye as FIN4, the group has been observed collecting information from nearly 100 publicly traded companies or their advisory firms, all parties who handle insider information that give a clear trading advantage to the attacker.

“Advanced threat actors conducting attacks to play the stock market to their advantage has long been a worry but never truly seen in action,” said Dan McWhorter, VP of threat intelligence, FireEye. “FIN4 is the first time we are seeing a group of very sophisticated attackers actually systematically acquire information that only has true value to a criminal when used in relation to the stock market.”

FIN4’s Distinct Attack Methods and Targets

Unlike the often nation-state backed Advanced Persistent Threat groups originating from China and Eastern Europe tracked by FireEye, FIN4 carries out its attacks in a unique manner never seen before. The group does not utilise malware, instead relying heavily on highly-targeted social engineering tactics and deep subject-matter expertise to deliver weaponised versions of legitimate corporate files. Specifically, FireEye found that since at least mid-2013, FIN4 has made product development, M&A strategies, legal issues, and purchasing processes of companies its target data points.

Social Engineering and Weaponised Documents

While FIN4’s unique methodology of not using malware allows them to evade traditional detection and attribution, the report provides analysis of the social engineering and document weaponisation the group employs as identified through FireEye investigations and detections. With a strong command of English colloquialisms, regulatory and compliance standards, and industry knowledge, FireEye researchers believe FIN4 to be US-based or, possibly, Western European.

FireEye researchers also found that while FIN4 has highly advanced techniques for breaking into an organisation, they have security practices on the data they transmit. Stolen login credentials were shown to be transferred to FIN4 servers in plain text while the operators themselves use TOR to mask their locations and identities.

Key Takeaways

  • FIN4 is a financially motivated threat group targeting insider information to manipulate stock trading.
  • The group avoids malware, relying on social engineering and weaponised legitimate documents with embedded macros.
  • Targets include C-suite executives and advisors in healthcare and pharmaceutical sectors, with campaigns dating back to mid‑2013.
  • FIN4 exfiltrates credentials in plain text and uses TOR to anonymise their activity, evading detection.

References

Frequently Asked Questions

What is FIN4?
FIN4 is a financially motivated advanced threat group identified by FireEye that steals insider information from publicly traded companies to gain an edge in stock trading.
How does FIN4 operate without malware?
FIN4 relies on highly targeted spear‑phishing using weaponised legitimate documents with embedded VBA macros or fake OWA login pages to harvest credentials.
Who are FIN4’s main targets?
They target C‑level executives, legal, regulatory, compliance personnel and advisory firms—especially in healthcare and pharmaceuticals—where stock‑moving insider info is rich.
How does FIN4 avoid detection after stealing credentials?
They transfer stolen credentials in plain text to their servers, use TOR for anonymity, and set Outlook rules to delete warning emails containing keywords like “malware.”

Tags

Related Articles

More from Top Stories

Explore more articles in the Top Stories category