Sign in to unlock valuable content and features from our AI-driven platform. Receive timely technology updates and the latest information from the solution providers who can help you realize your goals.
Start your journey by entering your name and email address below:
Please confirm your email address!
We are going to send a confirmation email to your email address to let you receive timely technology updates and the latest information from the solution providers who can help you realize your goals.
Is this you? Please confirm your name and email address below to receive the requested information.
Please check this box to confirm that you are opting-in to receive communications from Networking Technologies, LLC and the data sharing outlined in our privacy policy.
Initializing
Loading
ar_The_Hunt_for_VENOM_SPIDER_Part_2_2(1).pdf
Cybercriminals are evolving rapidly, and traditional security measures can't stop them. This report reveals how FIN6 and Cobalt Group use the Golden Chickens malware and highlights eSentire TRU's proactive threat-hunting strategies. Download the full report now to stay ahead of emerging threats. Need additional guidance? Contact Networking Technologies to discuss your security strategy.
Please enter your information below to view this content:
Golden Chickens is a sophisticated malware suite operated as Malware-as-a-Service (MaaS). It is primarily used by notorious financial crime groups, specifically Russia-based FIN6 and the Cobalt Group, which have collectively caused financial losses exceeding USD $1.4 billion. The malware has been utilized mainly for stealing credit and banking information, but there are concerns it could be repurposed for more destructive attacks, such as ransomware.
Are Golden Chickens attacks still happening?
Yes, Golden Chickens attacks are still occurring. eSentire's Threat Response Unit (TRU) tracked multiple cyberattacks using this malware throughout 2022 and into January 2023. They detected and shut down nine separate incidents and noted two additional failed attacks, targeting companies across various industries with online payment systems.
Who are the key threat actors behind Golden Chickens?
The two main threat actors identified are known as 'Chuck from Montreal' and 'Jack.' Chuck operates under the alias badbullzvenom on underground forums, while Jack, who has been tracked back to his teenage years, has developed various malware tools and is considered a significant figure in the cybercrime landscape. Their activities have been closely monitored by eSentire's TRU, which has gathered extensive intelligence on their operations.
ar_The_Hunt_for_VENOM_SPIDER_Part_2_2(1).pdf
published by Networking Technologies
Right-Sized Solutions. Built to Fit Your Business.
Your business isn’t like any other business, so why should your technology be? Networking Technologies helps you solve your business challenges with solutions that fit your business and your budget. We work closely with the most innovative IT manufacturers and suppliers to assemble best-fit solutions for each of our clients. We have a long history of bringing the right people, processes and technology together to achieve long-term success. With a dedicated team of engineers, project managers, consultants and technicians—our team is ready to meet you where you are. No matter how big or unique a challenge is, Networking Technologies can design and implement the right solution for you.