newstrooper newstrooper
  • Home
  • World News
  • Politics
  • Sports
  • Entertainment
  • Business
  • Technology
  • Travel
  • Gaming
Reading: Fin6 delivers More_Eggs malware using fake resumes on AWS hosts on LinkedIn
Share

News Trooper

Your Global Insight, Delivered Daily.

Search
  • Home
  • World News
  • Politics
  • Sports
  • Entertainment
  • Business
  • Technology
  • Travel
  • Gaming
Follow US
© 2025 All Rights Reserved | Powered by News Trooper News
News Trooper > Technology > Fin6 delivers More_Eggs malware using fake resumes on AWS hosts on LinkedIn
Technology

Fin6 delivers More_Eggs malware using fake resumes on AWS hosts on LinkedIn

June 11, 2025 4 Min Read
Share
Fin6 delivers More_Eggs malware using fake resumes on AWS hosts on LinkedIn
SHARE

Financially motivated threat actor known as FIN6 It has been observed to leverage fake resumes hosted on Amazon Web Services (AWS) infrastructure to provide a malware family called More_eggs.

“By launching conversations through platforms such as LinkedIn, under the guise of job seekers, the group actually builds relationships with recruiters before delivering phishing messages that lead to malware,” the Domaintools Investigations (DTI) team said in a report shared with Hacker News.

More_eggs is a work by another cybercrime group called Golden Chickens (aka Venom Spider), which has recently been attributed to a new family of malware such as Terrastealerv2 and Terralogger. JavaScript-based backdoors can enable subsequent attacks that include credentials, system access, and ransomware.

One known customer for malware is FIN6 (aka Camouflage Tempest, Gold Franklin, ITG08, Skeleton Spider, and TA4557). It has been operational since 2012.

Hacking groups also have a history of using MageCart JavaScript skimmers to target e-commerce sites to collect financial information.

According to Payment Card Services Company Visa, FIN6 has used More_eggs as a first-stage payload until 2018 to infiltrate several e-commerce merchants, inserting malicious JavaScript code into the checkout page to set the ultimate goal of stealing card data.

“The data from the stolen payment cards will later be monetized by the group, sold to intermediaries, and openly sold in markets such as JokerStash before shutting down in early 2021,” SecureWorks said in the profile of threat actors.

The latest activities from FIN6 include the use of social engineering to initiate contact with recruiters on professional job platforms such as LinkedIn, and in fact, pose as a job seeker who distributes links (e.g. Bobbyweisman()com, Ryanberardi(.)com).

See also  APT intrusion, AI malware, zero-click exploits, browser hijacking, etc.

Domaintoools said fake domains disguised as individual portfolios have been registered anonymously through adaddy and anonymously due to the extra layer of obfuscation that makes attributes and takedown efforts more difficult.

“By taking advantage of GoDaddy’s domain privacy services, Fin6 further protects true subscriber details from the public view and takedown team,” the company said. “GoDaddy is a well-reputed and widely used domain registrar, but its built-in privacy features allow threat actors to easily hide their identity.”

Another notable aspect is to use trusted cloud services such as AWS Elastic Compute Cloud (EC2) and S3 to host phishing sites. Additionally, the site comes with built-in traffic filtering logic so that only future victims will be provided with a link to download the expected resume after completing the CAPTCHA check.

“Only users who appear to be on a home IP address can download malicious documents using a typical Windows-based browser,” Domaintools said. “If the visitor comes from a known VPN service, a cloud infrastructure such as AWS, or a corporate security scanner, this site will instead provide a harmless, plain text version of your resume.”

The downloaded resume takes the form of a ZIP archive that triggers an infection sequence when opened to deploy the More_Eggs malware.

“FIN6’s skeleton spider campaign demonstrates how effective a low-complexity phishing campaign is when combined with cloud infrastructure and advanced evasion,” the researchers concluded. “We’re ahead of many detection tools by using realistic job lures, bypassing the scanner and hiding the malware behind the walls of the capture.”

Share This Article
Facebook Twitter Copy Link
Previous Article After an overwhelming performance from the MLB franchise, rumors about the Pittsburgh pirates continue. After an overwhelming performance from the MLB franchise, rumors about the Pittsburgh pirates continue.
Next Article Labubu Doll Craze Goes Global: Blind Boxes and Auctions Labubu Doll Craze Goes Global: Blind Boxes and Auctions
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular News

Musk’s decision to limit political spending leaves some Republicans cold

Musk’s decision to limit political spending leaves some Republicans cold

Elon Musk's pledge to retreat from campaign spending -- if…

June 2, 2025
GOP Rep. Bill Huizenga is preparing to run for Michigan's open Senate seat

GOP Rep. Bill Huizenga is preparing to run for Michigan's open Senate seat

McKinnack Island, Mich. -- Republican Rep. Bill Huizenga is preparing…

June 2, 2025
'It betrays our values': Progressives grapple with deadly shooting

'It betrays our values': Progressives grapple with deadly shooting

Progressive is tackling that two people who worked at the…

June 2, 2025
Beshear, Khanna to headline Dem mayor summit in July

Beshear, Khanna to headline Dem mayor summit in July

Two potential 2028 presidential primary candidates will descend on Cleveland…

June 2, 2025
Democrats are ‘stuck in that unfortunate reality’ in debate over Biden's illness

Democrats are ‘stuck in that unfortunate reality’ in debate over Biden's illness

24 hours after Sunday's announcement that former President Joe Biden…

June 2, 2025

You Might Also Like

Iran-linked blade ferine hits Iraqi and Kurdish targets with whispers and spear malware
Technology

Iran-linked blade ferine hits Iraqi and Kurdish targets with whispers and spear malware

5 Min Read
Ransomware gang exploits flaws in less than simple help to target victims with double fear tor
Technology

Ransomware gang exploits flaws in less than simple help to target victims with double fear tor

8 Min Read
Apple Zero-Clock flaws in messages abused by journalist spies using Paragon Spyware
Technology

Apple Zero-Clock flaws in messages abused by journalist spies using Paragon Spyware

7 Min Read
CISA adds Erlang SSH and RoundCube flaws to known exploited vulnerabilities catalogs
Technology

CISA adds Erlang SSH and RoundCube flaws to known exploited vulnerabilities catalogs

4 Min Read
newstrooper
newstrooper

Welcome to News Trooper, your reliable destination for global news that matters. In an age of information overload, we stand as a dedicated news platform committed to delivering timely, accurate, and insightful coverage of the world’s most significant events and trends.

  • Business
  • Entertainment
  • Gaming
  • Politics
  • Sports
  • Technology
  • Travel
  • World News
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • Home
  • World News
  • Politics
  • Sports
  • Entertainment
  • Business
  • Technology
  • Travel
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2025 All Rights Reserved | Powered by News Trooper News

Welcome Back!

Sign in to your account

Lost your password?