Winnti Hackers Split Cobalt Strike into 154 Pieces to Evade Detection
To find vulnerabilities in targeted networks or spread laterally within them, hackers used a mixture of commodity and specialized software, such as Acunetix, Nmap, SQLmap, OneForAll, subdomain3, subDomainsBrute, Sublist3r, and Cobalt Strike.