Names | ProxyChains | |
Category | Tools | |
Type | Tunneling | |
Description | (CrowdStrike) This open-source utility is capable of chaining proxies together and forcing network traffic through said chain of proxies, even if the program generating the traffic does not have proxy support. It utilizes a configuration file to specify proxies in use. The recovered configuration file contained a mixture of local IP addresses, IP addresses belonging to Vultr, and IP addresses belonging to eight different telecommunication organizations from around the world. | |
Information | <https://www.crowdstrike.com/blog/an-analysis-of-lightbasin-telecommunications-attacks/> |
Last change to this tool card: 03 November 2021
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
APT groups | |||||
LightBasin | [Unknown] | 2016 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |