

The collected information can be used later in lateral movement attacks. The following commands show the basic network and domain information of the environment that has the infected system. The attacker collected additional information by using backdoor malware NukeSped to send command line commands. Targeted Software: MS Office (PowerPoint, Excel, and Word) and Hancom 2010 Collected Data: Names of recently used files.Targeted Software: Outlook Express, MS Office Outlook, and Windows Live Mail Collected Data: email account information.Targeted Software: Google Chrome, Mozilla Firefox, Internet Explorer, Opera, and Naver Whale Collected Data: accounts and passwords saved in browsers, browser history.

The list of softwares and data for info-leakage is as follows:
