![]() ![]() Matryoshka is capable of stealing Outlook passwords. Lokibot has stolen credentials from multiple applications and data sources including Windows OS credentials, email clients, FTP, and SFTP clients. Leafminer used several tools for retrieving login and password information, including LaZagne. LaZagne can obtain credentials from databases, mail, and WiFi across multiple platforms. KGH_SPY can collect credentials from WINSCP. įIN6 has used the Stealer One credential stealer to target e-mail and file transfer utilities including FTP. Įvilnum can collect email credentials from victims. ĬosmicDuke collects user credentials, including passwords, for various programs including popular instant messaging applications and email clients as well as WLAN keys. Ĭarberp's ug plugin can gather account information from multiple instant messaging, email, and social media services, as well as FTP, VNC, and VPN clients. Īstaroth uses an external software known as NetPass to recover passwords. ĪPT39 has used the Smartftp Password Decryptor tool to decrypt FTP passwords. ĪPT33 has used a variety of publicly available tools like LaZagne to gather credentials. ĪPT29 used account credentials they obtained to attempt access to Group Managed Service Account (gMSA) passwords. Agent Tesla has the ability to steal credentials from FTP clients and wireless profiles.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |