WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Joint Cybersecurity Advisory – Impacket and Exfiltration Tool Used to Steal Sensitive Information from Defense Industrial Base Organization
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Joint Cybersecurity Advisory – Impacket and Exfiltration Tool Used to Steal Sensitive Information from Defense Industrial Base Organization

Author: Alec Davison

Created: Thursday, October 6, 2022 - 17:01

Categories: Cybersecurity, Security Preparedness

This week, the Cybersecurity and Infrastructure Security Agency (CISA), the FBI, and the National Security Agency (NSA) published a joint Cybersecurity Advisory (CSA) to highlight malicious cyber activity by advanced persistent threat (APT) actors observed on a Defense Industrial Base sector organization’s enterprise network. Most notably, the advisory highlights how threat actors continue to successfully maintain persistence in victim networks by leveraging legitimate account credentials.

Summary: From November 2021 through January 2022, CISA responded to APT activity on a Defense Industrial Base Sector organization’s enterprise network. While conducting incident response activities, CISA discovered that likely multiple APT groups compromised the organization’s network, and some APT actors had long-term access to the network. According to the CSA, “APT actors used an open-source toolkit called Impacket to gain their foothold within the environment and further compromise the network, and also used a custom data exfiltration tool, CovalentStealer, to steal the victim’s sensitive data.” The initial access vector is unknown. However, the APT actors maintained persistence likely by relying on legitimate account credentials. Furthermore, the tools allowed an Impacket user with credentials to “run commands on the remote device using the Windows management protocols required to support an enterprise network.”

The advisory includes APT actors tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) identified during incident response. Mitigation recommendations are also provided for network defenders.

To report suspicious or criminal activity related to information found in advisory, contact your local FBI field office, or the FBI’s 24/7 Cyber Watch (CyWatch) at (855) 292-3937, or by e-mail at Cy*****@*bi.gov. If you have any further questions, or to request incident response resources or technical assistance related to these threats, contact CISA at CI*************@******hs.gov. Access the full advisory at CISA.

Members are encouraged to report incidents and suspicious activities, first to local and other law enforcement authorities and then to WaterISAC by emailing an*****@*******ac.org, calling 866-H2O-ISAC, or using the online incident reporting form. 

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 7, 2026)

May 7, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness
Members Only

(TLP:GREEN) Gate 15 TARGET Report – Identity Centric Attacks: The Shift from Network to Identity as the Primary Attack Surface

May 7, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) CISA and Partners Release Guidance for Careful Adoption of Agentic AI Services

May 7, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar