FIN11

Also known as: TA505 (overlapping), DEV-0950
Affiliation Cybercriminal (Russian-speaking)
Motivation Financial
Status active
Country Unknown
First Seen 2016
Last Seen 2025
Target Geographies Global, North America, Europe

Executive Summary

FIN11 is a financially motivated threat actor tracked by Mandiant as a distinct cluster whose campaigns overlap with TA505- and Cl0p-linked activity. Active since at least 2016, the group conducts high-volume phishing campaigns and enterprise software exploitation that often precede ransomware deployment or large-scale data theft. The labels FIN11, TA505, and Cl0p should not be treated as perfect synonyms even when they intersect operationally.

The group’s campaigns have evolved from widespread phishing to targeted exploitation of enterprise file transfer appliances, including the Accellion FTA campaign that compromised over 100 organizations in 2020-2021. FIN11 represents the operational arm responsible for initial access and deployment in the Cl0p ransomware ecosystem.

Notable Campaigns

2020-2021 — Accellion FTA Exploitation

FIN11 exploited multiple zero-day vulnerabilities in the Accellion File Transfer Appliance to steal data from organizations including Shell, Bombardier, Morgan Stanley, and several universities. The DEWMODE web shell was deployed on compromised appliances for data exfiltration.

2019-2020 — High-Volume Phishing Campaigns

FIN11 conducted massive phishing campaigns using malicious Excel attachments with macros to deliver FlawedAmmyy RAT and SDBot, followed by Cl0p ransomware deployment on compromised networks.

Technical Capabilities

FIN11 maintains high-volume email distribution infrastructure capable of sending millions of phishing emails across campaigns. The group uses macro-laden Office documents, HTML smuggling, and more recently, exploitation of managed file transfer platforms such as Accellion FTA.

Post-compromise tools include FlawedAmmyy RAT, SDBot, and Cobalt Strike. The group shares operational infrastructure with Cl0p ransomware operators, but public reporting still treats FIN11 as a distinct intrusion cluster rather than a simple alias for all Cl0p activity.

Attribution

FIN11 is tracked by Mandiant as a distinct cluster based on unique operational patterns within the broader TA505 ecosystem. The overlap with Cl0p operations is supported by shared infrastructure, overlapping extortion infrastructure, and common tooling, but even Mandiant’s public reporting stops short of treating every Cl0p-branded intrusion as exclusively FIN11.

MITRE ATT&CK Profile

Initial Access: High-volume spearphishing (T1566.001) and exploitation of public-facing file transfer applications (T1190).

Execution: Macro-based execution (T1059.005), PowerShell (T1059.001), and web shell deployment (T1505.003).

Impact: Cl0p ransomware deployment (T1486) and data theft/extortion.

Sources & References