Chapter

Malware Identified in Network Traces Back to APT Group
The forensics team isolates the malware, studies it, and develops a profile for it, which leads them to link it back to an APT group. The team is hired to investigate and gather intel using their previous engagements and put some stuff in the network to look around.
Clips
The team was hired to conduct a compromise assessment of a company's network and examine the logs and network activity to see if there was any evidence of a hacker.
03:13 - 04:41 (01:28)
Summary
The team was hired to conduct a compromise assessment of a company's network and examine the logs and network activity to see if there was any evidence of a hacker. They were able to identify an active threat actor and emphasize the importance of assessing network security to prevent any potential breaches.
ChapterMalware Identified in Network Traces Back to APT Group
EpisodeEp 11: Strictly Confidential
PodcastDarknet Diaries
The forensics team identifies and studies malware, developing a profile by analyzing factors such as file size, names and activity.
04:41 - 07:03 (02:22)
Summary
The forensics team identifies and studies malware, developing a profile by analyzing factors such as file size, names and activity. By using this profile to identify indicators of compromise (IOCs), other security teams can more easily trace the malware's movement throughout the network and combat security breaches.
ChapterMalware Identified in Network Traces Back to APT Group
EpisodeEp 11: Strictly Confidential
PodcastDarknet Diaries
A cybersecurity expert talks about monitoring periods to determine the threat actor's activity and tools used, and identifies the impact of intellectual property theft to advanced tech companies in the millions of dollars.
07:03 - 10:00 (02:57)
Summary
A cybersecurity expert talks about monitoring periods to determine the threat actor's activity and tools used, and identifies the impact of intellectual property theft to advanced tech companies in the millions of dollars.