Chapter

Malware Identified in Network Traces Back to APT Group
listen on Spotify
03:13 - 10:00 (06:47)

The forensics team isolates the malware, studies it, and develops a profile for it, which leads them to link it back to an APT group. The team is hired to investigate and gather intel using their previous engagements and put some stuff in the network to look around.

Clips
The team was hired to conduct a compromise assessment of a company's network and examine the logs and network activity to see if there was any evidence of a hacker.
03:13 - 04:41 (01:28)
listen on Spotify
Network Security
Summary

The team was hired to conduct a compromise assessment of a company's network and examine the logs and network activity to see if there was any evidence of a hacker. They were able to identify an active threat actor and emphasize the importance of assessing network security to prevent any potential breaches.

Chapter
Malware Identified in Network Traces Back to APT Group
Episode
Ep 11: Strictly Confidential
Podcast
Darknet Diaries
The forensics team identifies and studies malware, developing a profile by analyzing factors such as file size, names and activity.
04:41 - 07:03 (02:22)
listen on Spotify
Network Security
Summary

The forensics team identifies and studies malware, developing a profile by analyzing factors such as file size, names and activity. By using this profile to identify indicators of compromise (IOCs), other security teams can more easily trace the malware's movement throughout the network and combat security breaches.

Chapter
Malware Identified in Network Traces Back to APT Group
Episode
Ep 11: Strictly Confidential
Podcast
Darknet Diaries
A cybersecurity expert talks about monitoring periods to determine the threat actor's activity and tools used, and identifies the impact of intellectual property theft to advanced tech companies in the millions of dollars.
07:03 - 10:00 (02:57)
listen on Spotify
Cybersecurity
Summary

A cybersecurity expert talks about monitoring periods to determine the threat actor's activity and tools used, and identifies the impact of intellectual property theft to advanced tech companies in the millions of dollars.

Chapter
Malware Identified in Network Traces Back to APT Group
Episode
Ep 11: Strictly Confidential
Podcast
Darknet Diaries