Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are impacting your business
Discovery | RMM Tools | Defense Evasion | Credential Theft | OffSec | Networking | LOLBAS | Exfiltration |
---|---|---|---|---|---|---|---|
Nmap
SoftPerfect NetScan
|
AnyDesk
Splashtop
SuperOps
|
|
|
Cobalt Strike
|
Chisel
|
|
RClone
|
No vulnerabilities exploited available.
Resource Development | Initial Access | Execution | Discovery | Command and Control | Defense Evasion | Persistence | Credential Access | Lateral Movement | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|
Malvertising | Exploit Public-Facing Application | Scheduled Task/Job: Scheduled Task | System Network Connections Discovery | Remote Access Software | Disable or Modify Tools | Create Account | Credentials from Web Browsers | Remote Services: SSH | Exfiltration to Cloud Storage | Data Encrypted for Impact |
Software Deployment Tools | Account Discovery: Domain Account | Proxy | Obfuscated Files or Information | OS Credential Dumping | Remote Desktop Protocol | |||||
Remote System Discovery | Obfuscated Files or Information: Software Packing | Lateral Tool Transfer | ||||||||
Account Discovery |
No negotiation chats available.