<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://enlacehacktivista.org/index.php?action=history&amp;feed=atom&amp;title=Academy_of_Public_Administration_%28Belarus%29</id>
	<title>Academy of Public Administration (Belarus) - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://enlacehacktivista.org/index.php?action=history&amp;feed=atom&amp;title=Academy_of_Public_Administration_%28Belarus%29"/>
	<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Academy_of_Public_Administration_(Belarus)&amp;action=history"/>
	<updated>2026-05-06T18:09:51Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.43.8</generator>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Academy_of_Public_Administration_(Belarus)&amp;diff=341&amp;oldid=prev</id>
		<title>Amongomous at 01:53, 26 January 2022</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Academy_of_Public_Administration_(Belarus)&amp;diff=341&amp;oldid=prev"/>
		<updated>2022-01-26T01:53:05Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 01:53, 26 January 2022&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l5&quot;&gt;Line 5:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 5:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Explanation of the Hack ==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Explanation of the Hack ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;According to an incident report leaked by the hackers themselves during the second hack, they gained initial access using the CVE-2019-0708 BlueKeep exploit on an unpatched Windows 2008 server that had RDP exposed to the internet &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;(on a non-standard port&lt;/del&gt;.&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;) &lt;/del&gt;They proceeded to dump local user credentials using [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/87be30d3b286677d878f98b7f49b81844fb7f474/Methodology%20and%20Resources/Windows%20-%20Mimikatz.md mimikatz], tunneled out using [https://github.com/jpillora/chisel chisel] and [https://github.com/3proxy/3proxy 3proxy] to use RDP and [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/1a3058f40c145a7c97fc71444cf3f1f38e3b4614/Methodology%20and%20Resources/Windows%20-%20Using%20credentials.md#psexecpy--smbexecpy--wmiexecpy psexec.py] for lateral movement on the internal network until landing on and taking over the domain controller. They then deleted data from both live and backup systems.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;According to an incident report leaked by the hackers themselves during the second hack, they gained initial access using the CVE-2019-0708 BlueKeep exploit on an unpatched Windows 2008 server that had RDP exposed to the internet. They proceeded to dump local user credentials using [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/87be30d3b286677d878f98b7f49b81844fb7f474/Methodology%20and%20Resources/Windows%20-%20Mimikatz.md mimikatz], tunneled out using [https://github.com/jpillora/chisel chisel] and [https://github.com/3proxy/3proxy 3proxy] to use RDP and [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/1a3058f40c145a7c97fc71444cf3f1f38e3b4614/Methodology%20and%20Resources/Windows%20-%20Using%20credentials.md#psexecpy--smbexecpy--wmiexecpy psexec.py] for lateral movement on the internal network until landing on and taking over the domain controller. They then deleted data from both live and backup systems.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;https://www.curatedintel.org/2022/01/hacktivist-group-shares-details-related.html&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;https://www.curatedintel.org/2022/01/hacktivist-group-shares-details-related.html&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Category:Hacks]]&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Category:Hacks]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Academy_of_Public_Administration_(Belarus)&amp;diff=340&amp;oldid=prev</id>
		<title>Amongomous: /* Explanation of the Hack */</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Academy_of_Public_Administration_(Belarus)&amp;diff=340&amp;oldid=prev"/>
		<updated>2022-01-26T01:51:31Z</updated>

		<summary type="html">&lt;p&gt;&lt;span class=&quot;autocomment&quot;&gt;Explanation of the Hack&lt;/span&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 01:51, 26 January 2022&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l5&quot;&gt;Line 5:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 5:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Explanation of the Hack ==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Explanation of the Hack ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;According to an incident report leaked by the hackers themselves during the second hack, they gained initial access using the CVE-2019-0708 BlueKeep exploit &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;in &lt;/del&gt;an unpatched Windows 2008 server that had &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;its &lt;/del&gt;RDP &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;port &lt;/del&gt;exposed to the internet. They proceeded to dump local user credentials using [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/87be30d3b286677d878f98b7f49b81844fb7f474/Methodology%20and%20Resources/Windows%20-%20Mimikatz.md&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;#mimikatz---mini-dump &lt;/del&gt;mimikatz], tunneled out using [https://github.com/jpillora/chisel chisel] and [https://github.com/3proxy/3proxy 3proxy] to use RDP and [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/1a3058f40c145a7c97fc71444cf3f1f38e3b4614/Methodology%20and%20Resources/Windows%20-%20Using%20credentials.md#psexecpy--smbexecpy--wmiexecpy psexec.py] for lateral movement on the internal network until landing on and taking over the domain controller. They then deleted data from both live and backup systems.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;According to an incident report leaked by the hackers themselves during the second hack, they gained initial access using the CVE-2019-0708 BlueKeep exploit &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;on &lt;/ins&gt;an unpatched Windows 2008 server that had RDP exposed to the internet &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;(on a non-standard port&lt;/ins&gt;.&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;) &lt;/ins&gt;They proceeded to dump local user credentials using [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/87be30d3b286677d878f98b7f49b81844fb7f474/Methodology%20and%20Resources/Windows%20-%20Mimikatz.md mimikatz], tunneled out using [https://github.com/jpillora/chisel chisel] and [https://github.com/3proxy/3proxy 3proxy] to use RDP and [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/1a3058f40c145a7c97fc71444cf3f1f38e3b4614/Methodology%20and%20Resources/Windows%20-%20Using%20credentials.md#psexecpy--smbexecpy--wmiexecpy psexec.py] for lateral movement on the internal network until landing on and taking over the domain controller. They then deleted data from both live and backup systems.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;https://www.curatedintel.org/2022/01/hacktivist-group-shares-details-related.html&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;https://www.curatedintel.org/2022/01/hacktivist-group-shares-details-related.html&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Category:Hacks]]&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Category:Hacks]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Academy_of_Public_Administration_(Belarus)&amp;diff=334&amp;oldid=prev</id>
		<title>Amongomous: Created page with &quot;Two hacks wiping and encrypting the internal network of the Academy of Public Administration in Belarus, by Cyber Partisans.  * Video of the second hack: https://www.youtube.com/watch?v=8l4etG0YKKQ  == Explanation of the Hack ==  According to an incident report leaked by the hackers themselves during the second hack, they gained initial access using the CVE-2019-0708 BlueKeep exploit in an unpatched Windows 2008 server that had its RDP port exposed to the internet. T...&quot;</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Academy_of_Public_Administration_(Belarus)&amp;diff=334&amp;oldid=prev"/>
		<updated>2022-01-26T00:37:00Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;Two hacks wiping and encrypting the internal network of the Academy of Public Administration in Belarus, by &lt;a href=&quot;/index.php/Cyber_Partisans&quot; title=&quot;Cyber Partisans&quot;&gt;Cyber Partisans&lt;/a&gt;.  * Video of the second hack: https://www.youtube.com/watch?v=8l4etG0YKKQ  == Explanation of the Hack ==  According to an incident report leaked by the hackers themselves during the second hack, they gained initial access using the CVE-2019-0708 BlueKeep exploit in an unpatched Windows 2008 server that had its RDP port exposed to the internet. T...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Two hacks wiping and encrypting the internal network of the Academy of Public Administration in Belarus, by [[Cyber Partisans]].&lt;br /&gt;
&lt;br /&gt;
* Video of the second hack: https://www.youtube.com/watch?v=8l4etG0YKKQ&lt;br /&gt;
&lt;br /&gt;
== Explanation of the Hack ==&lt;br /&gt;
&lt;br /&gt;
According to an incident report leaked by the hackers themselves during the second hack, they gained initial access using the CVE-2019-0708 BlueKeep exploit in an unpatched Windows 2008 server that had its RDP port exposed to the internet. They proceeded to dump local user credentials using [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/87be30d3b286677d878f98b7f49b81844fb7f474/Methodology%20and%20Resources/Windows%20-%20Mimikatz.md#mimikatz---mini-dump mimikatz], tunneled out using [https://github.com/jpillora/chisel chisel] and [https://github.com/3proxy/3proxy 3proxy] to use RDP and [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/1a3058f40c145a7c97fc71444cf3f1f38e3b4614/Methodology%20and%20Resources/Windows%20-%20Using%20credentials.md#psexecpy--smbexecpy--wmiexecpy psexec.py] for lateral movement on the internal network until landing on and taking over the domain controller. They then deleted data from both live and backup systems.&lt;br /&gt;
&lt;br /&gt;
https://www.curatedintel.org/2022/01/hacktivist-group-shares-details-related.html&lt;br /&gt;
&lt;br /&gt;
[[Category:Hacks]]&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
</feed>