FIN6, a financially-motivated cybercrime group possibly of Russian origin, has been linked to attacks against point-of-sale systems in retail and hospitality sectors since at least 2015. The group is known to have used FrameworkPOS and GratefulPOS malware, deployed Ryuk and LockerGaga ransomware, and also linked to various Magecart campaigns. Learn how to use MITRE ATT&CK techniques with the FIN6 emulation plan to know what will happen if your organization gets hit by this cybercrime group. Join AttackIQ cyber experts Jose Barajas and Mark Bagley to learn how your team can leverage breach and attack simulation to test the group’s activities in production, at scale. They will also touch on other groups, such as APT29, to understand your risks by looking at the results of what happened after running an emulation plan.