Profile picture
Christopher Glyer @cglyer
, 9 tweets, 2 min read Read on Twitter
Reading justice.gov/opa/pr/russian… today reminded me how I got my start in #DFIR in 2008 investigating FIN1. Let's take a walk down memory lane.
FIN1 (in my experience) has had a few major periods of activity (2007-2009, 2011-2012, and 2014-2015) - each with their own distinct set of TTPs. They've significantly improved their capabilities over the years (even though multiple members have been arrested)
FIN1 in the first period had the following TTPs: 1) didn't use backdoors 2) broke in commonly via SQL Injection 3) uploaded new tools by creating temporary tables and exporting the file via BCP 4) deployed a sniffer named sn.exe to identify systems with track data in memory
FIN1 already had intimate knowledge of financial orgs - including how debit card PINs were encrypted, and the hardware security module (HSM) devices and protocols used to encrypt/decrypt the PIN numbers.
I once observed FIN1 identify the HSM, enumerate the protocols it supported, and use it to execute an encryption protocol downgrade attack. The benefit was - they turned a PIN block (an encrypted version of a PIN) that used salting - to a version with no salt applied.
This allowed FIN1 to then calculate every permutation of PINs (e.g 0000 to 9999) with the downgraded encryption protocol - and then perform a lookup against the downgraded PIN blocks.
FIN1 also knew enough about how financial orgs limited ATM withdrawals - & knew (or figured out how) to increase database limits that control # withdrawals per ATM, # withdrawals per day & total amount allowed per day. They increased limits to max amount - and cashed out millions
FIN1 only needed 20-30 cards w/ increased values to perform the cash out. My theory was - they gave a single debut card number to a cash out team. That way they could query the db and know exactly how much that "team" stole - so they could payment % back to the central org
FIN1 in this period was characterized by low opsec, significant knowledge of fin systems/orgs (they might have worked in fin orgs before) & for me at time as a pen tester who knew SQLi really well - FIN1 had amazing SQLi capabilities. They did things I had no idea were possible
Missing some Tweet in this thread?
You can try to force a refresh.

Like this thread? Get email updates or save it to PDF!

Subscribe to Christopher Glyer
Profile picture

Get real-time email alerts when new unrolls are available from this author!

This content may be removed anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member and get exclusive features!

Premium member ($3.00/month or $30.00/year)

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!