
| Names | LaZagne | |
| Category | Tools | |
| Type | Credential stealer | |
| Description | LaZagne is a post-exploitation, open-source tool used to recover stored passwords on a system. It has modules for Windows, Linux, and OSX, but is mainly focused on Windows systems. LaZagne is publicly available on GitHub. | |
| Information | <https://github.com/AlessandroZ/LaZagne> <https://www.trendmicro.com/en_us/research/20/k/weaponizing-open-source-software-for-targeted-attacks.html> <https://edu.anarcho-copy.org/Against%20Security%20&%20%20Self%20Security/Group-IB%20RedCurl.pdf> <https://unit42.paloaltonetworks.com/lazagne-leverages-d-bus/> | |
| MITRE ATT&CK | <https://attack.mitre.org/software/S0349/> | |
| Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/py.lazagne> | |
| AlienVault OTX | <https://otx.alienvault.com/browse/pulses?q=tag:LazaGne> | |
Last change to this tool card: 06 September 2023
Download this tool card in JSON format
| Changed | Name | Country | Observed | ||
APT groups | |||||
| ALPHV, BlackCat Gang | [Unknown] | 2021-Mar 2024 | ![]() | ||
| ↳ Subgroup: Scattered Spider | [Unknown] | 2022-Aug 2025 | ![]() | ||
| APT 3, Gothic Panda, Buckeye | 2007-Nov 2017 | ![]() | |||
| APT 33, Elfin, Magnallium | 2013-Apr 2024 | ||||
| Evilnum | [Unknown] | 2018-2022 | |||
| Gallium | 2018-Jun 2022 | ||||
| Gangnam Industrial Style | [Unknown] | 2019 | |||
| IAmTheKing | 2018 | ||||
| Leafminer, Raspite | 2017 | ||||
| MuddyWater, Seedworm, TEMP.Zagros, Static Kitten | 2017-Jul 2025 | ![]() | |||
| OilRig, APT 34, Helix Kitten, Chrysene | 2014-Sep 2024 | ![]() | |||
| RedCurl | [Unknown] | 2018-Mar 2025 | |||
| Sprite Spider, Gold Dupont | [Unknown] | 2015-Nov 2022 | |||
| Traveling Spider | [Unknown] | 2019-Mar 2021 | |||
| Wizard Spider, Gold Blackburn | 2014-May 2025 | ![]() | |||
15 groups listed (15 APT, 0 other, 0 unknown)
|
Digital Service Security Center Follow us on |
Report incidents |
|
| +66 (0)2-123-1227 | ||
| [email protected] | ||