Researchers say threat actors used the sophisticated — and unfortunately named — toolkit to target high-value networks for ...