Chapter

Potential Collaboration Between Triton Attackers and a Research Institute
The possibility of a collaboration between the Triton attackers and a research institute was discussed, as it would explain the multidisciplinary nature of the attack. While the attackers did not have a proper infrastructure attack in place, an IP address was tracked by the FIRE research team related to the intrusions of the Triton team.
Clips
Despite competition in the industry, cybersecurity companies often collaborate to share information and protect their customers.
44:38 - 46:24 (01:46)
Summary
Despite competition in the industry, cybersecurity companies often collaborate to share information and protect their customers. However, there are some instances where the severity of a threat requires public attention and government intervention.
ChapterPotential Collaboration Between Triton Attackers and a Research Institute
Episode68: Triton
PodcastDarknet Diaries
The IP address linked to the intrusions of the Triton team has been traced back to a Moscow-based research institute that publishes reports on thermovision, gas dynamics, and high energy substances.
46:24 - 50:03 (03:39)
Summary
The IP address linked to the intrusions of the Triton team has been traced back to a Moscow-based research institute that publishes reports on thermovision, gas dynamics, and high energy substances. The same IP address was also observed engaging in suspicious activity and conducting reconnaissance on other plants.
ChapterPotential Collaboration Between Triton Attackers and a Research Institute
Episode68: Triton
PodcastDarknet Diaries
The cyber-attack at a water treatment plant in Florida might have involved collaboration between a research institute and a hacker group, as it seems they did not have the proper infrastructure attack in place to completely cover their tracks.
50:03 - 52:42 (02:38)
Summary
The cyber-attack at a water treatment plant in Florida might have involved collaboration between a research institute and a hacker group, as it seems they did not have the proper infrastructure attack in place to completely cover their tracks. However, more skilled government hacking groups tend to conduct operations from established institutions to have better attack infrastructure.