• Login
Whats Current In
No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
No Result
View All Result
Whats Current In
No Result
View All Result
Home Cyber Security

Ex-Conti members and FIN7 devs team up to push new Domino malware

Lawrence Abrams by Lawrence Abrams
April 17, 2023
Reading Time: 4 mins read
0
Ex-Conti members and FIN7 devs team up to push new Domino malware

Person in purge mask

RELATED POSTS

CISA warns govt agencies of recently patched Barracuda zero-day

QBot malware abuses Windows WordPad EXE to infect devices

Hot Pixels attack checks CPU temp, power changes to steal data

Ex-Conti ransomware members have teamed up with the FIN7 threat actors to distribute a new malware family named ‘Domino’ in attacks on corporate networks.

Domino is a relatively new malware family consisting of two components, a backdoor named ‘Domino Backdoor,’ which in turn drops a ‘Domino Loader’ that injects an info-stealing malware DLL into the memory of another process.

IBM’s Security Intelligence researchers have been tracking ex-Conti and TrickBot members utilizing the new malware in attacks since February 2023.

However, a new IBM report released Friday links the actual development of the Domino malware to the FIN7 hacking group — a cybercriminal outfit linked to a variety of malware, and the BlackBasta and DarkSide ransomware operations.

The Domino Malware attacks

Since the fall of 2022, IBM researchers have been tracking attacks using a malware loader named ‘Dave Loader’ that is linked to former Conti ransomware and TrickBot members.

This loader was seen deploying Cobalt Strike beacons that utilize a ‘206546002’ watermark, observed in attacks from by ex-Conti members in the Royal and Play ransomware operations.

Buy JNews
ADVERTISEMENT

IBM says Dave Loader has also been seen deploying Emotet, which was used almost exclusively by the Conti ransomware operation in June 2022, and then later by the BlackBasta and Quantum ransomware gangs.

However, more recently, IBM says they have seen Dave Loader installing the new Domino malware family.

Most commonly, Dave Loader would drop ‘Domino Backdoor,’ which would then install ‘Domino Loader.’

Domino Backdoor is a 64-bit DLL that will enumerate system information, such as running processes, usernames, computer names, and send it back to the attacker’s Command and Control server. The backdoor also receives commands to execute or further payloads to install.

The backdoor was seen downloading an additional loader, Domino Loader, that installs an embedded .NET info-stealer called ‘Nemesis Project.’ It can also plant a Cobalt Strike beacon, for greater persistence.

“The Domino Backdoor is designed to contact a different C2 address for domain-joined systems, suggesting a more capable backdoor, such as Cobalt Strike, will be downloaded on higher value targets instead of Project Nemesis,” explains the IBM researchers Charlotte Hammond and Ole Villadsen.

Domino malware attack flow
Domino malware attack flow
Source: IBM

Project Nemesis is a standard information-stealing malware that can collect credentials stored in browsers and applications, cryptocurrency wallets, and browser history.

Ex-Conti members team up with FIN7

Threat actors, especially those who utilize ransomware, commonly partner with other threat groups to distribute malware and for initial access to corporate networks.

For example, TrickBot, Emotet, BazarBackdoor, and QBot (QakBot) have a long history of providing initial access to ransomware operations, such as REvil, Maze, Egregor, BlackBasta, Ryuk, and Conti.

Over time, the lines between the malware developers and the ransomware gangs have grown murky, making distinguishing between the two operations hard.

With the formation of the Conti cybercrime syndicate, these lines faded even more as the ransomware operation assumed control of both TrickBot and BazarBackdoor’s development for their own operations.

Furthermore, after Conti shut down, the ransomware operation splintered into smaller cells, with members moving all over the ransomware space, including Royal, Play, Quantum/Zeon/Dagon, BlackBasta, LockBit, and more.

IBM has attributed the Domino malware family to FIN7 due to a great deal of code overlap with Lizar (aka Tirion and DiceLoader), a post-exploitation toolkit associated with FIN7.

Furthermore, IBM found that a loader named ‘NewWorldOrder,’ normally used in FIN7’s Carbanak attacks, was recently used to push the Domino malware.

NewWorldOrder loading Domino
NewWorldOrder loading Domino
Source: IBM

So, in a confusing joint venture, we have Dave Loader (TrickBot/Conti) pushing the Domino (FIN7) malware, which in turn deploys Project Nemesis or Cobalt Strike beacons believed to be associated with ex-Conti member ransomware activity.

This means that defenders have to deal with a confusing web of threat actors, all with malware allowing remote access to networks.

Share54Tweet34Pin12
Lawrence Abrams

Lawrence Abrams

Related Posts

CISA orders govt agencies to update iPhones, Macs by May 1st
Cyber Security

CISA warns govt agencies of recently patched Barracuda zero-day

May 27, 2023
New QakNote attacks push QBot malware via Microsoft OneNote files
Cyber Security

QBot malware abuses Windows WordPad EXE to infect devices

May 27, 2023
Hot Pixels attack checks CPU temp, power changes to steal data
Cyber Security

Hot Pixels attack checks CPU temp, power changes to steal data

May 27, 2023
Time to challenge yourself in the 2023 Google CTF!
Cyber Security

Time to challenge yourself in the 2023 Google CTF!

May 26, 2023
Time to challenge yourself in the 2023 Google CTF!
Cyber Security

Time to challenge yourself in the 2023 Google CTF!

May 26, 2023
The Week in Ransomware – December 16th 2022 – Losing Trust
Cyber Security

The Week in Ransomware – May 26th 2023 – Cities Under Attack

May 26, 2023

Recommended Stories

EarSpy attack eavesdrops on Android phones via motion sensors

EarSpy attack eavesdrops on Android phones via motion sensors

December 27, 2022
I questioned ChatGPT’s Ethereum Classic price prediction and this happened

I probed ChatGPT to know Ethereum Classic’s future price trajectory

May 21, 2023
How to prevent Microsoft OneNote files from infecting Windows with malware

How to prevent Microsoft OneNote files from infecting Windows with malware

March 5, 2023

Popular Stories

  • New Python malware backdoors VMware ESXi servers for remote access

    Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide

    137 shares
    Share 55 Tweet 34
  • Facts and myths about the warriors who raided Europe and explored the New World

    137 shares
    Share 55 Tweet 34
  • Exploit released for actively abused ProxyNotShell Exchange bug

    137 shares
    Share 55 Tweet 34
  • New Windows Server updates cause domain controller freezes, restarts

    136 shares
    Share 54 Tweet 34
  • Bing Chat’s secret modes turn it into a personal assistant or friend

    136 shares
    Share 54 Tweet 34
Whats Current In

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Visit our landing page to see all features & demos.

LEARN MORE »

Recent Posts

  • Uniswap spikes despite StarkNet; Avalanche in pursuit?
  • Avorak AI: A leading force in the crypto space
  • Trader Joe: Jimbo protocol attacked, are your holdings safe

Categories

  • Apple Computer
  • Blockchain
  • Cyber Security
  • Tech News
  • Venture Capital

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?