Episode

89: Cybereason - Molerats in the Cloud
listen on Spotify
59:35
Published: Tue Apr 06 2021
Description

The threat research team at Cybereason uncovered an interesting piece of malware. Studied it and tracked it. Which lead them to believe they were dealing with a threat actor known as Molerats.  Sponsors This episode is sponsored by Cybereason. Cybereason reverses the attacker’s advantage and puts the power back in your hands. Their future-ready attack platform gives defenders the wisdom to uncover, understand, and piece together multiple threats. And the precision focus to end cyberattacks instantly – on computers, mobile devices, servers, and the cloud. They do all this through a variety of tools they’ve developed such as antivirus software, endpoint monitoring, and mobile threat detection tools. They can give you the power to do it yourself, or they can do all the monitoring and respond to threats in your environment for you. Or you can call them after an incident to get help cleaning up. If you want to monitor your network for threats, check out what Cybereason can do for you. Cybereason. End cyber attacks. From endpoints to everywhere. Learn more at Cybereason.com/darknet. View all active sponsors. Sources https://www.cybereason.com/hubfs/dam/collateral/reports/Molerats-in-the-Cloud-New-Malware-Arsenal-Abuses-Cloud-Platforms-in-Middle-East-Espionage-Campaign.pdf https://malpedia.caad.fkie.fraunhofer.de/actor/molerats https://www.fireeye.com/blog/threat-research/2013/08/operation-molerats-middle-east-cyber-attacks-using-poison-ivy.html Learn more about your ad choices. Visit podcastchoices.com/adchoices

Chapters
Cyber Reason, a company specialized in email and workplace collaboration security solutions, is sponsoring an extra episode of the podcast and promoting their product's ability to detect suspicious emails and diversify security measures.
00:00 - 02:33 (02:33)
listen on Spotify
Security
Summary

Cyber Reason, a company specialized in email and workplace collaboration security solutions, is sponsoring an extra episode of the podcast and promoting their product's ability to detect suspicious emails and diversify security measures.

Episode
89: Cybereason - Molerats in the Cloud
Podcast
Darknet Diaries
Hear about the unique training of Unit 8200, Israel's intelligence unit, which teaches young recruits to become experts in information manipulation and access.
02:34 - 12:52 (10:18)
listen on Spotify
Intelligence
Summary

Hear about the unique training of Unit 8200, Israel's intelligence unit, which teaches young recruits to become experts in information manipulation and access. The unit's training includes both formal computer science studies and secret missions with intelligence agencies.

Episode
89: Cybereason - Molerats in the Cloud
Podcast
Darknet Diaries
Cybersecurity company, Leor Grebler's Vocalis Health, highlights the importance of collecting massive amounts of data in real time to analyze and detect malicious behavior rather than just indicators of compromise like malware or bad IP addresses.
12:52 - 22:03 (09:10)
listen on Spotify
Cybersecurity
Summary

Cybersecurity company, Leor Grebler's Vocalis Health, highlights the importance of collecting massive amounts of data in real time to analyze and detect malicious behavior rather than just indicators of compromise like malware or bad IP addresses. By using AI, organizations can detect activity that looks benign but is actually a threat to their security.

Episode
89: Cybereason - Molerats in the Cloud
Podcast
Darknet Diaries
A cybersecurity response team has the ability to not only detect malicious activity in a network, but also has the resources to fix issues.
22:03 - 27:13 (05:10)
listen on Spotify
Cybersecurity
Summary

A cybersecurity response team has the ability to not only detect malicious activity in a network, but also has the resources to fix issues. They can identify every step of a hack and understand the password used in the process.

Episode
89: Cybereason - Molerats in the Cloud
Podcast
Darknet Diaries
The technical aspect of working in threat intelligence must be tied to a global or geopolitical context to gain a better understanding of what's really going on beyond just the technical aspects of how attacks occur.
27:13 - 33:24 (06:10)
listen on Spotify
Threat Intelligence
Summary

The technical aspect of working in threat intelligence must be tied to a global or geopolitical context to gain a better understanding of what's really going on beyond just the technical aspects of how attacks occur. The discussion is followed by a story from the threat research team about their discovery of a new and interesting piece of malware.

Episode
89: Cybereason - Molerats in the Cloud
Podcast
Darknet Diaries
Researchers found new types of malware and remote control capabilities being used by hackers.
33:24 - 43:43 (10:19)
listen on Spotify
Malware
Summary

Researchers found new types of malware and remote control capabilities being used by hackers. The malware exfiltrated data through Dropbox and had remote access capabilities, with hackers able to control the infected computer remotely.

Episode
89: Cybereason - Molerats in the Cloud
Podcast
Darknet Diaries
Cyber Reason tracks and publishes reports on the actions of various hacker groups, including the mole rats, to make the world more secure.
43:43 - 58:28 (14:45)
listen on Spotify
Cyber Security
Summary

Cyber Reason tracks and publishes reports on the actions of various hacker groups, including the mole rats, to make the world more secure. With 51 threat intelligence reports on mole rats by various security companies, the system collects evidence and evolves it to suspicions to correlate multiple evidence and identify actual attacks.

Episode
89: Cybereason - Molerats in the Cloud
Podcast
Darknet Diaries
Cyber Reason is a cybersecurity company with offices around the world, helping their customers protect their networks from malicious activity.
58:29 - 59:30 (01:01)
listen on Spotify
Cybersecurity
Summary

Cyber Reason is a cybersecurity company with offices around the world, helping their customers protect their networks from malicious activity. They offer demos of their products if interested, and have had a long-lasting satisfied customer since their early days.

Episode
89: Cybereason - Molerats in the Cloud
Podcast
Darknet Diaries