During the investigation of the campaign, researchers found that the attackers employed the extensive use of both dual-use and living-off-the-land tools. Also, some of the indications say that APT hackers initially attacked and exploited the publicly facing systems and further
moved to the victim’s networks.
There are several publicly available tools of the following have been used in this attack:-
• AdFind – A publicly available tool that is used to query Active Directory.
• Winmail – Can open winmail.dat files.
1. Dehashed—View leaked credentials. 2. SecurityTrails—Extensive DNS data. 3. DorkSearch—Really fast Google dorking. 4. ExploitDB—Archive of various exploits.
5. ZoomEye—Gather information about targets. 6. Pulsedive—Search for threat intelligence. 7. GrayHatWarefare—Search public S3 buckets. 8. PolySwarm—Scan files and URLs for threats. 9. Fofa—Search for various threat intelligence. 10. LeakIX—Search publicly indexed information.
11. DNSDumpster—Search for DNS records quickly. 13. FullHunt—Search and discovery attack surfaces. 14. AlienVault—Extensive threat intelligence feed. 12. ONYPHE—Collects cyber-threat intelligence data. 15. Grep App—Search across a half million git repos.
1. HackXpert - Free labs and training. 2. TryHackMe - Hands-on exercises and labs. 3. CyberSecLabs - High quality training labs. 4. Cybrary - Videos, labs, and practice exams.
5. LetsDefend - Blue team training platform. 6. Root Me - Over 400 cybersecurity challenges. 7. RangeForce - Interactive and hands-on platform. 8. Certified Secure - Loads of different challenges.
9. Vuln Machines - Real world scenarios to practice. 10. Try2Hack - Play a game based on the real attacks. 11. TCM Security - Entry level courses for cybersecurity. 12. EchoCTF - Train your offensive and defensive skills. 13. Hack The Box - Cybersecurity training platform.