Automate Lateral Movement : hacking | Torhoo darknet markets
Hi, is it possible to develop a malware that automatically pivot from one host to another host inside a subnet? can someone give references from some APT's/threat actors to learn? thanks in advance
yeah it’s possible, look into lateral movement techniques.
u can also check out tools like Cobalt Strike, Impacket, BloodHound, and PsExec.
for real-world APT refs, study APT29, FIN7, and so...
MITRE ATT&CK has detailed TTPs: https://attack(dot)mitre(dot)org/tactics/TA0008/
thanks mate, I have tried Impacket suite and bloodhound but so far didn't find the feature to automatic lateral movement. My goal is creating agent that can move to another host inside a network
I am not allowed to share liniks to platforms but this will help.
Real APT Examples to Study
APT29 (Cozy Bear / Nobelium)
Known for stealthy lateral movement using token impersonation and WMI.
Used legitimate tools like Rubeus, Cobalt Strike, and Kerberos abuse.
Reference: Mandiant APT29 Report
APT10 (Stone Panda / China)
Lateral movement via logon scripts, scheduled tasks, and remote desktop abuse.
Used DLL side-loading to hide presence.
Reference: Operation Cloud Hopper
WannaCry & NotPetya (Russia/North Korea)
Not true APTs, but both wormed through SMBv1 EternalBlue exploits.
Demonstrated automated subnet-wide pivoting via unpatched systems.
UNC1878 / Wizard Spider (Ryuk / Trickbot operators)
Used automated tools like BloodHound, PowerShell Empire, and custom scripts to auto-pivot across hospitals and enterprises.
This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.
u can also check out tools like Cobalt Strike, Impacket, BloodHound, and PsExec.
for real-world APT refs, study APT29, FIN7, and so...
MITRE ATT&CK has detailed TTPs: https://attack(dot)mitre(dot)org/tactics/TA0008/