FIN12
Executive Summary
FIN12 is a financially motivated threat actor that specializes in rapid ransomware deployment, often completing intrusions from initial access to encryption in under two days. Tracked by Mandiant since 2018, the group is distinguished by its willingness to target healthcare organizations, including during the COVID-19 pandemic, and its reliance on initial access brokers rather than running its own large phishing program.
FIN12 has deployed Ryuk and Conti ransomware and operates within the broader TrickBot/Conti ecosystem. The group’s operations prioritize speed over data exfiltration, frequently encrypting systems without first stealing data — a departure from the double-extortion model adopted by most ransomware groups.
Notable Campaigns
2020 — Healthcare Sector Targeting During COVID-19
FIN12 targeted multiple healthcare organizations during the COVID-19 pandemic, deploying Ryuk ransomware against hospitals and healthcare systems. These attacks disrupted patient care operations and drew condemnation from law enforcement agencies.
2021-2022 — Conti Ransomware Deployment
FIN12 transitioned from Ryuk to Conti ransomware, maintaining its rapid deployment model. The group conducted operations across North America and Europe, with a focus on organizations with annual revenues exceeding $300 million.
Technical Capabilities
FIN12’s operational model relies on purchasing initial network access from brokers rather than conducting phishing campaigns. Access is typically obtained through TrickBot, BazarLoader, or compromised RDP credentials. Once inside a network, FIN12 operators move to domain-wide ransomware deployment within 24-48 hours.
The group uses Cobalt Strike for C2 and lateral movement, with SystemBC as a backup C2 channel. Ransomware deployment uses Group Policy Objects or PsExec for network-wide distribution.
Attribution
Mandiant published a detailed report on FIN12 in October 2021, establishing it as a distinct intrusion cluster. The group’s operations overlap with the broader Conti/TrickBot ecosystem, which was exposed through leaked internal communications (Conti Leaks) in 2022. HHS published a threat brief warning the healthcare sector of FIN12 targeting.
MITRE ATT&CK Profile
Initial Access: Valid accounts from access brokers (T1078), TrickBot/BazarLoader infections (T1566.001).
Execution: PowerShell (T1059.001), WMI (T1047), Cobalt Strike beacons.
Lateral Movement: RDP (T1021.001), PsExec, and Group Policy deployment.
Impact: Rapid ransomware deployment (T1486) prioritizing encryption speed over data theft.
Sources & References
- Mandiant: FIN12 Ransomware Intrusion Actor — Mandiant, 2021-10-07
- CISA: Advisory AA20-302A - Ransomware Activity — CISA, 2020-10-28
- HHS HC3: FIN12 Threat Profile — HHS, 2021-11-15