Arsenal attributed to FIN7.
Following MITRE ATT&CK Flow methodology.
| CVE | Year | Description |
|---|---|---|
| CVE-2017-0199 | 2017 | Office/WordPad RCE for phishing delivery |
| CVE-2018-15982 | 2018 | Flash Player RCE in phishing documents |
Documented in MITRE ATT&CK, vendor intelligence, and government advisories.
Mitigations with MITRE ATT&CK IDs. Click badges for implementation guidance.
| Plan | Source | Type | Description | Link |
|---|---|---|---|---|
| MITRE CTID - FIN7 Full Emulation Plan | MITRE CTID | Open Source | Complete FIN7 emulation with Scenario 1 (detection) and Scenario 2 (protection) | Open |
| FIN7 Emulation - Scenario 1 Walkthrough | MITRE CTID | Open Source | Step-by-step: spearphishing, mshta execution, Cobalt Strike, POS targeting | Open |
| FIN7 Emulation - Scenario 2 Protection | MITRE CTID | Open Source | Protection scenario testing defenses against FIN7 POS targeting and Cobalt Strike payloads | Open |
| SCYTHE #ThreatThursday - FIN7 | SCYTHE | Blog Post | Weekly threat emulation walkthrough with FIN7 TTPs, ATT&CK mapping, and defense guidance | Open |
| Mandiant: FIN7 Evolution and Phishing LNK | Mandiant | Blog Post | Technical analysis of FIN7 evolution with emulation-relevant TTPs and detection opportunities | Open |
| Emulating FIN7 - Part 1 | AttackIQ | Blog Post | Two attack graphs emulating FIN7 2024 activities: brand impersonation websites, malvertising | Open |
| Emulating FIN7 - Part 2 | AttackIQ | Blog Post | FIN7 2022-2023 TTPs: BOOSTWRITE loader, Cobalt Strike, lateral movement to POS systems | Open |
| Fingerprinting FIN7 | AttackIQ | Blog Post | Assessment template for FIN7 emulation with TTP walkthrough and scenario investigation | Open |