Impacket
Associated Software Descriptions |
|
Name | Description |
---|
Groups That Use This Software |
||
ID | Name | References |
---|---|---|
G1016 | FIN13 |
(Citation: Sygnia Elephant Beetle Jan 2022) |
G0059 | Magic Hound |
(Citation: DFIR Phosphorus November 2021) |
G0096 | APT41 |
(Citation: apt41_dcsocytec_dec2022) |
G0074 | Dragonfly 2.0 |
(Citation: US-CERT TA18-074A) (Citation: US-CERT APT Energy Oct 2017) (Citation: Core Security Impacket) |
G0125 | HAFNIUM |
(Citation: Tarrask scheduled task) |
G0030 | Lotus Blossom |
(Citation: Cisco LotusBlossom 2025) |
G0027 | Threat Group-3390 |
(Citation: Unit42 Emissary Panda May 2019) |
G0035 | Dragonfly |
(Citation: Core Security Impacket) (Citation: US-CERT TA18-074A) |
G1046 | Storm-1811 |
(Citation: rapid7-email-bombing) |
G1021 | Cinnamon Tempest |
(Citation: Sygnia Emperor Dragonfly October 2022) (Citation: Microsoft Ransomware as a Service) |
G1017 | Volt Typhoon |
(Citation: CISA AA24-038A PRC Critical Infrastructure February 2024) (Citation: Microsoft Volt Typhoon May 2023) (Citation: Joint Cybersecurity Advisory Volt Typhoon June 2023) |
G0016 | APT29 |
(Citation: Mandiant APT29 Eye Spy Email Nov 22) |
G0045 | menuPass |
(Citation: PWC Cloud Hopper Technical Annex April 2017) |
G0034 | Sandworm Team |
(Citation: Microsoft Prestige ransomware October 2022) |
G1003 | Ember Bear |
(Citation: Cadet Blizzard emerges as novel threat actor) (Citation: CISA GRU29155 2024) |
G1047 | Velvet Ant |
(Citation: Sygnia VelvetAnt 2024A) |
G0116 | Operation Wocao |
(Citation: FoxIT Wocao December 2019) |
G0061 | FIN8 |
(Citation: Bitdefender Sardonic Aug 2021) (Citation: Bitdefender FIN8 July 2021) |
References
- Sygnia Team. (2024, June 3). China-Nexus Threat Group ‘Velvet Ant’ Abuses F5 Load Balancers for Persistence. Retrieved March 14, 2025.
- Sygnia Incident Response Team. (2022, January 5). TG2003: ELEPHANT BEETLE UNCOVERING AN ORGANIZED FINANCIAL-THEFT OPERATION. Retrieved February 9, 2023.
- Adepts of 0xCC. (2021, January 28). The Kerberos Credential Thievery Compendium (GNU/Linux). Retrieved September 17, 2024.
- SecureAuth. (n.d.). Retrieved January 15, 2019.
- Boal, Calum. (2020, January 28). Abusing Kerberos From Linux - An Overview of Available Tools. Retrieved September 17, 2024.
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.