Site icon Information Security Buzz

Cybereason’s Nocturnus Researchers Discover Widescale Hacking Operation Targeting Financial Institutions In The United States And Europe

hacker 1944688 640

Cybereason, creators of the leading Cyber Defense Platform, today released an investigative research report from its Nocturnus Research Group titled ‘Dropping Anchor: From a TrickBot Infection to the Discovery of the Anchor Malware’ looking at a new series of hacking campaigns against financial, manufacturing, and retail businesses across the United States and Europe.

“We chose not to discuss attribution in this research, but the nature of these attacks appear to be aligned with the financially-motivated FIN6 threat actor, a group that is known to target POS systems and has been linked to TrickBot infections in the past. The gravity and danger that lies in commodity malware infections have the potential of escalating into a hacking operation with a disastrous outcome, whether it be a ransomware infection or theft of sensitive financial data,” said Assaf Dahan, Cybereason, Senior Director, Head of Threat Research.

Earlier this year, Cybereason researchers uncovered a severe threat using the Emotet and TrickBot trojans to deliver Ryuk ransomware. The dropping anchor campaign started with a TrickBot infection and progressed into a hacking operation targeting sensitive financial systems.

While previous operations focused on causing ransomware infections by compromising critical assets like the domain controller, this new operation targets Point-of-Sale (PoS) systems. The campaign leverages a newly discovered malware family called Anchor exclusively for high-profile targets.

Additional Dropping Anchor Research Highlights Include:

About the Author

Exit mobile version