ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool Plink

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: Plink

NamesPlink
PuTTY Link
CategoryTools
TypeTunneling
Description(FireEye) A common utility used to tunnel RDP sessions is PuTTY Link, commonly known as Plink. Plink can be used to establish secure shell (SSH) network connections to other systems using arbitrary source and destination ports. Since many IT environments either do not perform protocol inspection or do not block SSH communications outbound from their network, attackers such as FIN8 have used Plink to create encrypted tunnels that allow RDP ports on infected systems to communicate back to the attacker command and control (C2) server.
Information<https://www.fireeye.com/blog/threat-research/2019/01/bypassing-network-restrictions-through-rdp-tunneling.html>
AlienVault OTX<https://otx.alienvault.com/browse/pulses?q=tag:plink>

Last change to this tool card: 20 April 2020

Download this tool card in JSON format

All groups using tool Plink

ChangedNameCountryObserved

APT groups

XChafer, APT 39Iran2014-Sep 2020X
 GalliumChina2018-Jun 2022 
XHomeLand JusticeIran2022-Jan 2024 HOT 
XLazarus Group, Hidden Cobra, Labyrinth ChollimaNorth Korea2007-Feb 2024 HOTX
XOilRig, APT 34, Helix Kitten, ChryseneIran2014-Aug 2023X
 Parisite, Fox Kitten, Pioneer KittenIran2017-Nov 2020 

6 groups listed (6 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]