Chapter
Clips
The Elderwood group used zero-day exploits to breach various companies.
22:23 - 26:26 (04:02)
Summary
The Elderwood group used zero-day exploits to breach various companies. They studied components used in specific weapons/tanks to figure out companies supplying those parts or software, and then targeted third-party suppliers of top-tier defense companies in their cyber attacks.
ChapterDefense Contractors Should Beware of Elderwood Hacking Group
EpisodeEp 19: Operation Aurora
PodcastDarknet Diaries
The Elderwood Hacking Group operates by stealing source code, gathering information on targets, and launching attacks.
26:26 - 30:51 (04:25)
Summary
The Elderwood Hacking Group operates by stealing source code, gathering information on targets, and launching attacks. Companies should take note, especially those that supply to defense contractors, as there has been a truce between the US and China since 2017 stating that neither side will engage in cyber-enabled theft of intellectual property for commercial advantage.
