ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool LaZagne

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: LaZagne

NamesLaZagne
CategoryTools
TypeCredential stealer
DescriptionLaZagne is a post-exploitation, open-source tool used to recover stored passwords on a system. It has modules for Windows, Linux, and OSX, but is mainly focused on Windows systems. LaZagne is publicly available on GitHub.
Information<https://github.com/AlessandroZ/LaZagne>
<https://www.trendmicro.com/en_us/research/20/k/weaponizing-open-source-software-for-targeted-attacks.html>
<https://edu.anarcho-copy.org/Against%20Security%20&%20%20Self%20Security/Group-IB%20RedCurl.pdf>
MITRE ATT&CK<https://attack.mitre.org/software/S0349/>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/py.lazagne>
AlienVault OTX<https://otx.alienvault.com/browse/pulses?q=tag:LazaGne>

Last change to this tool card: 24 April 2021

Download this tool card in JSON format

All groups using tool LaZagne

ChangedNameCountryObserved

APT groups

XALPHV, BlackCat Gang[Unknown]2021-Aug 2022 HOT 
XAPT 3, Gothic Panda, BuckeyeChina2007-Nov 2017X
 APT 33, Elfin, MagnalliumIran2013-Nov 2019 
XEvilnum[Unknown]2018-2022 
 Gangnam Industrial Style[Unknown]2019 
 IAmTheKingRussia2018 
 Leafminer, RaspiteIran2017 
 MuddyWater, Seedworm, TEMP.Zagros, Static KittenIran2017-Nov 2021X
 OilRig, APT 34, Helix Kitten, ChryseneIran2014-May 2022X
 RedCurl[Unknown]2018-2021 
 Sprite Spider, Gold Dupont[Unknown]2015-Mar 2022 
 Traveling Spider[Unknown]2019-Mar 2021 
 Wizard Spider, Gold BlackburnRussia2014-Jun 2022 HOTX

13 groups listed (13 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]